<s>
Norton	B-Application
Insight	I-Application
whitelists	O
files	O
based	O
on	O
reputation	O
.	O
</s>
<s>
Norton-branded	O
antivirus	B-Application
software	I-Application
then	O
leverages	O
the	O
data	O
to	O
skip	O
known	O
files	O
during	O
virus	B-Application
scans	I-Application
.	O
</s>
<s>
However	O
,	O
its	O
goal	O
was	O
later	O
changed	O
to	O
making	O
virus	B-Application
scans	I-Application
more	O
efficient	O
;	O
instead	O
of	O
scanning	O
every	O
file	O
,	O
known	O
files	O
are	O
skipped	O
,	O
cutting	O
scanning	O
times	O
.	O
</s>
<s>
Among	O
the	O
data	O
collected	O
are	O
the	O
processes	O
running	O
and	O
their	O
SHA256	B-Algorithm
values	O
.	O
</s>
<s>
A	O
reappearing	O
hash	O
value	O
and	O
its	O
corresponding	O
file	O
are	O
whitelisted	O
,	O
and	O
Norton	B-Application
Insight	I-Application
checks	O
the	O
processes	O
on	O
a	O
user	O
's	O
computer	O
against	O
the	O
whitelist	O
.	O
</s>
<s>
The	O
third	O
option	O
is	O
to	O
disable	O
Norton	B-Application
Insight	I-Application
.	O
</s>
<s>
Norton	O
analyzes	O
the	O
NTFS	B-Application
file	I-Application
system	I-Application
upon	O
startup	O
,	O
and	O
if	O
unaccounted	O
changes	O
are	O
found	O
,	O
trust	O
values	O
of	O
the	O
processes	O
on	O
the	O
system	O
are	O
revoked	O
.	O
</s>
<s>
In	O
the	O
case	O
of	O
a	O
mistake	O
,	O
a	O
revocation	O
mechanism	O
was	O
implemented	O
,	O
where	O
clients	O
receive	O
a	O
list	O
of	O
revoked	O
SHA256	B-Algorithm
values	O
via	O
LiveUpdate	O
.	O
</s>
<s>
If	O
the	O
client	O
has	O
a	O
file	O
matching	O
a	O
SHA256	B-Algorithm
and	O
is	O
currently	O
trusting	O
that	O
file	O
,	O
all	O
trust	O
is	O
revoked	O
,	O
and	O
the	O
file	O
is	O
once	O
again	O
scanned	O
.	O
</s>
<s>
Norton	B-Application
File	I-Application
Insight	I-Application
was	O
a	O
feature	O
released	O
in	O
Norton	O
2010	O
products	O
.	O
</s>
