Skip to content

Instantly share code, notes, and snippets.

@donbr
Created April 1, 2025 17:59
Show Gist options
  • Save donbr/349530cc5f798b7e30977a25fe31a9b9 to your computer and use it in GitHub Desktop.
Save donbr/349530cc5f798b7e30977a25fe31a9b9 to your computer and use it in GitHub Desktop.
norton360-dev-settings.md

Best Practices Guide: Configuring Norton 360 for Development with Cursor and Windsurf (April 2025)

I. Introduction

This guide provides comprehensive instructions for configuring Norton 360 to work effectively with modern AI-powered development environments, specifically focusing on Cursor and Windsurf. As of April 2025, Norton 360 has undergone significant updates, including enhanced AI-based threat detection and interface changes that can affect developer workflows. This guide addresses the latest version (22.24.8.36 and later) and its impact on development activities.

Developers frequently encounter conflicts between Norton 360's security features and development tools, often experiencing blocked executables, interrupted debugging sessions, and slowed development workflows. These issues have become more pronounced with the latest versions of Norton 360 as they utilize more advanced AI to analyze files and network connections.

II. Understanding Norton 360's Impact on Development Environments (2025 Update)

Recent Changes to Norton 360

Norton 360's recent updates have introduced several changes relevant to developers:

  1. Enhanced AI-based Threat Detection: Norton now uses more sophisticated artificial intelligence to analyze files entering your device and blocks those deemed malicious. This can lead to more false positives for development activities.

  2. UI Navigation Changes: The user interface has been significantly redesigned, making it more challenging to find specific settings like firewall configurations and exclusions.

  3. Automatic Website Blocking: Newer versions have implemented more aggressive automatic blocking of websites without providing options to choose, which can affect development resources and API endpoints.

Common Issues with AI-powered Development Tools

Modern AI code assistants like Cursor and Windsurf present unique challenges:

  1. AI Feature Network Access: These tools require consistent network access to AI services for code generation and analysis.

  2. Temporary File Creation: AI-powered IDEs create numerous temporary files that may be flagged by Norton's scanning.

  3. Code Execution Patterns: The way these tools execute and test code can trigger Norton's behavioral detection.

  4. WSL Integration Challenges: Many developers use Windows Subsystem for Linux with these tools, creating additional security monitoring complexities.

III. Navigating the New Norton 360 Interface (2025)

Finding Settings in the Updated UI

The Norton 360 interface has changed significantly, causing confusion for many users. Based on recent reports:

  1. Accessing Settings:

    • Open Norton 360
    • Look for the gear/cog icon, which is now typically found in the left sidebar labeled as "Settings"
    • In some versions, you may need to click on "My Norton" first, then find the settings icon
  2. Locating Security Features:

    • Within Settings, look for separate categories related to different protection features
    • Antivirus settings, Firewall, and other protection options may be organized differently than in previous versions
  3. Navigation Challenges and Workarounds:

    • If you cannot find specific settings, use the search function within Norton (if available)
    • Consider checking online documentation or Norton Community forums for the most current navigation paths
    • The Norton support site may have updated guides for specific features

IV. Setting Up Comprehensive Exclusions

Configuring Exclusions in Current Norton 360 Versions

As of 2025, the exclusion process remains similar but navigation has changed:

  1. Access Exclusion Settings:

    • Open Norton 360
    • Navigate to Settings
    • Select Antivirus
    • Choose the Scans and Risks tab
    • Scroll to the Exclusions/Low Risks section
    • Click Configure [+] next to "Items to Exclude from Scans"
  2. Configure Multiple Protection Types: To ensure complete protection, you must set exclusions in all of these areas:

    • Items to Exclude from Scans
    • Items to Exclude from Auto-Protect
    • Items to Exclude from SONAR
    • Items to Exclude from Download Intelligence Detection

Essential Directories for Cursor and Windsurf Development

For effective development with modern AI coding tools, exclude these key locations:

  1. Core Development Directories:

    C:\Users\[username]\Documents\Projects
    C:\Users\[username]\source\repos
    [Custom project locations]
    
  2. Cursor-specific Directories:

    C:\Users\[username]\.cursor
    C:\Program Files\Cursor\
    [Cursor workspace folders]
    
  3. Windsurf-specific Directories:

    C:\Users\[username]\.windsurf
    C:\Users\[username]\.codeium
    C:\Program Files\Windsurf\
    [Windsurf workspace folders]
    
  4. AI Feature Directories:

    C:\Users\[username]\.cache\cursor
    C:\Users\[username]\.cache\windsurf
    C:\Users\[username]\.cache\codeium
    [Temporary AI processing directories]
    
  5. WSL Integration (if applicable):

    C:\Users\[username]\AppData\Local\Packages\[WSL distro folders]
    

Special Consideration for AI-generated Code

Modern AI coding assistants create unique patterns that may trigger Norton's protection:

  1. Temporary File Exclusions:

    • Consider excluding temporary file patterns used by these tools
    • Add exclusions for .tmp files in editor workspace directories
  2. Output Directories:

    • Exclude build and output directories specific to your projects
    • Consider using dedicated build directories outside of system-protected areas

V. Configuring Firewall Settings for Development

Accessing Firewall Settings in Current UI

Finding firewall settings in the latest Norton 360 versions:

  1. Navigation Path:

    • Open Norton 360
    • Access Settings
    • Look for Firewall or Network sections
    • If difficult to find, search online for the most current path for your specific version
  2. Alternative Access Methods:

    • Right-click the Norton icon in the system tray
    • Look for Firewall or Network options in the context menu
    • Some versions may offer "Quick Controls" for firewall settings

Program Rules for Development Tools and Frameworks

  1. IDE and Editor Applications:

    • Locate Program Rules or Application Control in Firewall settings
    • Add Cursor and Windsurf executables to the list:
      • C:\Program Files\Cursor\Cursor.exe
      • C:\Program Files\Windsurf\Windsurf.exe
    • Set access to "Allow" or "Auto" (preferably "Allow" for consistent operation)
    • Ensure that sub-processes launched by these tools also have network access
  2. Python Development Tools:

    • Allow Python executables:
      • C:\Program Files\Python3x\python.exe
      • C:\Program Files\Python3x\pythonw.exe
    • Package managers:
      • C:\Program Files\Python3x\Scripts\pip.exe
      • C:\Users\[username]\.cargo\bin\uv (if using uv)
    • Virtual environment executables in project directories
  3. Node.js Development Tools:

    • Main executables:
      • C:\Program Files\nodejs\node.exe
      • C:\Program Files\nodejs\npm.cmd
      • C:\Program Files\nodejs\npx.cmd
      • C:\Users\[username]\AppData\Roaming\npm\yarn.cmd (if using Yarn)
    • Allow node-gyp which is often flagged when compiling native modules:
      • This tool requires Python and may trigger multiple alerts
  4. Docker and Container Tools:

    • Docker executables:
      • C:\Program Files\Docker\Docker\Docker Desktop.exe
      • C:\Program Files\Docker\Docker\resources\bin\docker.exe
      • C:\Program Files\Docker\Docker\resources\bin\docker-compose.exe
    • Create a special rule to allow traffic from Docker's subnet:
      • Create a rule allowing connections from 10.0.75.0/24 subnet
      • Move this rule above any blocking rules in your firewall configuration
  5. Java Build Tools:

    • Maven:
      • C:\Program Files\Apache\maven\bin\mvn.cmd (or your installation path)
    • Gradle:
      • C:\Program Files\Gradle\gradle-x.x\bin\gradle.bat (or your installation path)
  6. WSL Components:

    • Core executables:
      • C:\Windows\System32\wsl.exe
      • C:\Windows\System32\bash.exe
    • Configure for network access with appropriate rules

Network Trust Configurations

  1. Development Network Settings:

    • Consider setting your development network as "Trusted"
    • For home development, set your home network to "Trusted" in Norton
  2. AI Service Access for Modern IDEs:

    • Ensure these tools can access their respective AI cloud services
    • Both Cursor and Windsurf require consistent network access for AI features
    • Look for blockages in Norton's connection logs if AI features fail
  3. Container and WSL Network Configuration:

    • For Docker, configure Norton to allow traffic on the Docker subnet:
      • Create rule to allow traffic from 10.0.75.0/24
    • For WSL, ensure Norton allows WSL bridge network traffic

VI. Troubleshooting Norton 360 in Development Environments (2025)

Dealing with Persistent Blocking Issues

Recent Norton updates have made troubleshooting more necessary for developers:

  1. When Exclusions Don't Work:

    • Verify that exclusions are set in ALL protection types (not just one)
    • Use absolute paths instead of relative paths
    • Try temporarily disabling protection to isolate the issue
    • Re-add exclusions after significant Norton updates
  2. For Repeated Blocking of Self-developed Applications:

    • Consider enabling "Trust automatically files from trusted publishers"
    • If available, use developer certificates to sign your applications
    • Implement a dedicated development profile in Norton

Handling Network Access Issues

For AI-powered development tools that require consistent network connectivity:

  1. Connection Troubleshooting:

    • Check Norton's connection logs for blocked attempts
    • Temporarily disable the firewall to determine if Norton is the cause
    • Configure explicit allow rules for specific domains used by AI services
  2. WSL Connection Problems:

    • Ensure Norton is configured to allow WSL network communications
    • Add specific rules for WSL networking if required
    • Consider exclusions for WSL-related processes

Temporary Protection Measures

When development activities are repeatedly disrupted despite configuration:

  1. Focused Disabling:

    • Rather than turning off all protection, disable only specific components
    • Use "Silent Mode" where available (for intensive development sessions)
    • Re-enable protection immediately after critical development activities
  2. Time-limited Exceptions:

    • Look for options to create time-limited exceptions rather than permanent ones
    • Schedule intensive development during planned Norton quiet periods
    • Document successful workarounds for future reference

VII. Best Practices for Balancing Security and Development Productivity (2025)

Current Recommendations for Secure Development

  1. Strategic Exclusions:

    • Exclude only what's necessary, not entire system directories
    • Review and update exclusions regularly as your development environment changes
    • Use the most specific paths possible to limit security exposure
  2. Development Environment Isolation:

    • Consider using virtual machines for development to isolate from main system
    • Implement container-based development where feasible
    • Use dedicated development profiles in Norton if available
  3. Security-minded Development:

    • Implement code signing practices where possible
    • Maintain separate development and production environments
    • Regularly update all development tools and dependencies

Development Tool Configuration Reference

The following table provides a quick reference for common development tools and their Norton 360 configuration requirements:

Tool / Framework Executable Paths Firewall Setting Exclusion Directories
Python python.exe, pythonw.exe Allow .venv, .virtualenvs, __pycache__
pip pip.exe Allow .pip, pip-cache
uv uv.exe, .cargo\bin\uv Allow .cache\uv
Node.js node.exe Allow node_modules
npm npm.cmd, npx.cmd Allow .npm
Yarn yarn.cmd Allow .yarn, .yarnrc
Docker docker.exe, docker-compose.exe Allow Docker, .docker
Maven mvn.cmd Allow .m2, target
Gradle gradle.bat Allow .gradle, build
WSL wsl.exe, bash.exe Allow \\wsl$\, WSL package folders
Cursor Cursor.exe Allow .cursor, .cache\cursor
Windsurf Windsurf.exe Allow .windsurf, .cache\windsurf, .codeium

Quick Reference Checklist (2025)

□ Set exclusions in ALL Norton protection types (Scans, Auto-Protect, SONAR, Download Intelligence)
### Quick Reference Checklist (2025)

□ Set exclusions in ALL Norton protection types (Scans, Auto-Protect, SONAR, Download Intelligence) □ Configure firewall to explicitly allow IDE, compiler, and runtime executables □ Add exclusions for development directories and build output folders □ Allow critical network access for package managers (pip, npm, uv, etc.) □ Configure Docker subnet access (10.0.75.0/24) in firewall settings □ Set up proper WSL access if using Windows Subsystem for Linux □ Create specific exclusions for AI-powered tools' temporary directories □ Test configurations with sample builds before full development □ Document working configurations for quick recovery □ Review settings after each Norton update □ Consider virtual machine isolation for critical development


---

## Troubleshooting Decision Flowchart

```mermaid
flowchart TD
    A[Development Issue Detected] --> B{Norton Notification\nVisible?}
    B -->|Yes| C[Check Notification Details]
    B -->|No| D{Build/Debug\nFailing?}
    C --> E[Configure Specific Exclusion]
    D -->|Yes| F{Network Connection\nError?}
    D -->|No| G[Check Build Tool Issues]
    F -->|Yes| H[Check Firewall Settings]
    F -->|No| I[Temporarily Disable\nSpecific Protection]
    I --> J{Issue Resolved?}
    J -->|Yes| K[Configure Permanent Exclusions]
    J -->|No| L[Try Norton Support or Forums]
    H --> M{Issue Resolved?}
    M -->|Yes| N[Document Working Configuration]
    M -->|No| O[Check Docker/WSL Settings]
    E --> P{Multiple Protection\nTypes?}
    P -->|Yes| Q[Configure All Protection Types]
    P -->|No| R[Add to Remaining Types]
    G --> S{Package Manager\nError?}
    S -->|Yes| T[Check Package Manager\nNetwork Access]
    S -->|No| U[Review Build Tool\nAccess]

By following these updated guidelines, developers can create an optimal environment where Norton 360's 2025 security features provide protection without hindering productivity in modern AI-powered development environments like Cursor and Windsurf.

By following these updated guidelines, developers can create an optimal environment where Norton 360's 2025 security features provide protection without hindering productivity in modern AI-powered development environments like Cursor and Windsurf.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment