SecureAnywhere for PCs User Guide

204
User Guide for PCs SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection

Transcript of SecureAnywhere for PCs User Guide

Page 1: SecureAnywhere for PCs User Guide

User Guidefor PCs

SecureAnywhere AntiVirusSecureAnywhere Internet Security Plus

SecureAnywhere Complete

Endpoint Protection

Page 2: SecureAnywhere for PCs User Guide

CopyrightWebroot SecureAnywhere User Guide for PCs

July, 2013

© 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere isa trademark of Webroot Software, Inc. All other product and company names mentioned may be trademarks orregistered trademarks of their respective owners.

Page 3: SecureAnywhere for PCs User Guide

Table of Contents

Getting Started 1

Installing SecureAnywhere on a PC 2Creating aWebroot account 8Using the SecureAnywhere interface 12Using the system tray 14Viewing protection status 15

Scanning for Malware 17

Running scans 18Viewing the latest scan results 18Running a scan immediately 19

Managing detected threats 21Changing the scan schedule 22Changing the scan settings 25

Shielding Your PC 29

Managing shields 30Changing Realtime shield settings 32Changing Behavior shield settings 35Changing Core System shield settings 38ChangingWeb Threat shield settings 41UsingWeb Threat protection 44Surfing websites 44Using search engines 45

Using Firewall Protection 47

Managing the firewall 48Changing firewall alert settings 49Managing network applications 50

Managing Quarantine 53

Managing quarantined items 54Managing file detection 56Using antimalware tools 58

Page 4: SecureAnywhere for PCs User Guide

Managing Identity Protection 61

Managing Identity Protection 62Changing Identity Protection settings 63Managing protected applications 66Managing protected websites 69

Managing Passwords 73

Using passwordmanagement 74Downloading the passwords component 75

Managing Backup & Sync 77

Using Backup & Sync 78Downloading the Backup & Sync component 79Synchronizing files 81Changing sync settings 85Adding sync folders 88Synchronizing folders with other computers 92Removing a folder from synchronization 95Backing up files 97Changing backup settings 101Changing backup filters 104Changing the backup schedule 107Checking file status 109

Using the System Cleaner 113

Running a system cleanup 114Running a scheduled cleanup 117ChangingWindows Desktop settings 120ChangingWindows system settings 123Changing Application settings 126Changing Internet Explorer settings 128Using Secure File Removal 132Viewing the cleanup log 135

Using Advanced Tools 137

Controlling active processes 138Using the SafeStart sandbox 140

Page 5: SecureAnywhere for PCs User Guide

Saving a scan log 142Using the System Analyzer 143Viewing the execution history 145Viewing the protection statistics 146

Managing Your Account 149

Viewing your account details 150Activating a new keycode 151Renewing your subscription 152Checking for updates 153

Setting Preferences 155

Setting general preferences 156Setting basic configuration 162Setting access control 166Defining proxy server settings 169Adjusting heuristics 172Exporting and importing settings 177Setting self protection 180

Accessing Support and Resources 183

Accessing Technical Support options 184Accessing additional publications 185Saving a threat log for analysis 186Submitting a file toWebroot for analysis 187

Glossary 189

Index 193

Page 6: SecureAnywhere for PCs User Guide
Page 7: SecureAnywhere for PCs User Guide

- 1 -

Getting Started

Webroot® SecureAnywhere™ delivers complete protection against viruses, spyware, and other online threatswithout slowing down PC performance or disrupting your normal activities. With its fast scans and threatremoval, you can rest assured that malware is eliminated quickly and easily. SecureAnywhere gives you thefreedom to surf, share, shop, and bank online — all with the confidence that your PC and your identity will bekept safe.

Note: This guide describes the features of all SecureAnywhere editions: AntiVirus, Internet SecurityPlus, Complete, or Endpoint. Your edition may not include some of the features described in this guide.

To get started with SecureAnywhere, see the following topics:

Installing SecureAnywhere on a PC 2Creating a Webroot account 8Using the SecureAnywhere interface 12Using the system tray 14Viewing protection status 15

Page 8: SecureAnywhere for PCs User Guide

Installing SecureAnywhere on a PCSecureAnywhere is available in several editions, described in the table below. If you aren't certain whichedition you purchased, look at the email from Webroot (if you purchased SecureAnywhere online) or theproduct packaging (if you purchased SecureAnywhere from a store).

SecureAnywhere editions

AntiVirus Provides protection from viruses, spyware, and phishing. Alsoincludes a firewall and features for safe web searching.This edition is available with:

l Licenses for 1 or 3 devices (PC or Mac)

l Subscriptions for 1 or 2 years

Internet SecurityPlus

Provides all the features of the AntiVirus edition, plus apassword management feature and protection for mobile devices.This edition is available with:

l Licenses for 3 or 5 devices (PC, Mac, or mobile)

l Subscriptions for 1 or 2 years

Complete Provides all the features of the Internet Security Plus edition,along with a system cleaner that removes traces of Internetactivity and a feature for backing up and synchronizing yourdata.This edition is available with:

l Licenses for 5 devices (PC, Mac, or mobile)

l Subscriptions for 1, 2, or 3 years

Endpoint Provides all the features of the AntiVirus edition, plus thesystem cleaner. (This product is available only with the EndpointProtection business version of SecureAnywhere.)

User Guide for PCs

- 2 -

Page 9: SecureAnywhere for PCs User Guide

You can install SecureAnywhere on a device with one of the following operating systems:

SecureAnywhere system requirements

PCs Compatible with the following operating systems:

l Windows® 8 32-bit and 64-bit

l Windows 7 32-bit and 64-bit (all Editions), Windows 7SP1 32-bit and 64-bit (all Editions)

l Windows XP 32-bit and 64-bit SP2, SP3

l Windows Vista® 32-bit (all Editions), Windows VistaSP1, SP2 32-bit and 64-bit (all Editions)

Minimum system requirements:

l Intel®Pentium®/Celeron® family, or AMD®K6/Athlon™/Duron™ family, or other compatibleprocessor

l 128 MB RAM (minimum)

l 10 MB Hard Disk Space

Internet access with one of the following browsers:

l Microsoft® Internet Explorer® 7.0 and higher

l Mozilla® Firefox® 3.6 and higher

l Google Chrome™ 10.0 or higher

Macs Compatible with the following operating systems:

l Mac OS® X v.10.7 "Lion"

l Mac OS X v. 10.8 " Mountain Lion"

For more information on Mac requirements and how to installSecureAnywhere on a Mac, see the Webroot SecureAnywhereUser Guide for Mac OS X. You will also need a separateinstaller file for Mac. Go to your Mac and download the filefrom: http://anywhere.webrootcloudav.com/zerol/wsamac.dmg

Getting Started

- 3 -

Page 10: SecureAnywhere for PCs User Guide

SecureAnywhere system requirements

Mobile Compatible with the following operating systems:

l Android™ devices with operating system version 2.2 orhigher

l Apple® devices with iOS version 4.2 or later (compatiblewith iPhone®, iPod touch®, and iPad® mobile digitaldevices)

Mobile apps are available with the purchase of Internet SecurityPlus or Complete editions. You can also purchase themseparately. To download and install mobile apps, see thedownload instructions.

To install SecureAnywhere on a PC:

1. Before you begin:a. Read the license agreement at: http://detail.webrootanywhere.com/eula.asp.

b. Close all programs that may be open on your computer.

c. Make sure you have the keycode, which is a 20-character license that identifies your Webrootaccount. Your keycode comes in an email message or is listed inside the retail box. If youpurchased a multi-user license, you can use the same keycode to install the software on up tothree or five devices.Note: The keycode is associated only with SecureAnywhere and does not include any informationrelated to your computer or its configuration. Webroot does not use the keycode in any way totrack individual use of its products.

2. Start the installation routine either from a CD or from a downloaded file:l If you are installing from a CD, insert the CD into the CD drive. An installation dialog openswhere you can click a link to begin. If the installation dialog does not open, use WindowsExplorer to navigate to your CD drive and double-click the software’s installation file.

l If you are installing from a downloaded file, navigate to where you downloaded the file inWindows Explorer and double-click the file to start the installation. Click Run to begin.

3. When the Webroot installer dialog opens, enter your keycode in the field. (If your keycode came in anemail, you can cut and paste the code into this field.)

User Guide for PCs

- 4 -

Page 11: SecureAnywhere for PCs User Guide

4. If desired, you can click the Installation Options link at the bottom right to modify these settings:

o Change the installation location. In this field, you can enter a different folder for theSecureAnywhere installation files.

o Create a shortcut to SecureAnywhere on the desktop. Click this checkbox to place ashortcut icon on your Windows Desktop for Webroot SecureAnywhere.

o Randomize the installed filename to bypass certain infections. Click this checkbox tochange the Webroot installation filename to a random name (for example,“QrXC251G.exe”), which prevents malware from detecting and blocking Webroot’sinstallation file.

o Protect the SecureAnywhere files, processes, and memory from modification. Clickthis checkbox to enable self protection and the CAPTCHA prompts. (CAPTCHA requiresthat you read distorted text on the screen and enter the text in a field before performing anycritical actions.) For more information, see "Setting self protection" on page 180 and"Setting access control" on page 166.

o Change Language. To change the language displayed in SecureAnywhere, click theChange Language button and select from the supported languages. (You can only changethe displayed language during installation, not after.)

The Installation Options dialog is similar to the following example.

Getting Started

- 5 -

Page 12: SecureAnywhere for PCs User Guide

Click Close when you're done.

5. At the main Installation dialog, click Agree and Install to begin installation.

6. If you are prompted to enter an email address, enter your address and click Continue.SecureAnywhere begins scanning and configuring the application. If your system is clean,SecureAnywhere displays a status screen similar to the following example.

Note: If SecureAnywhere detects threats during the scan, it moves the items to quarantine where they

User Guide for PCs

- 6 -

Page 13: SecureAnywhere for PCs User Guide

are rendered inoperable and can no longer harm your system or steal data. For more information, see"Managing quarantined items" on page 54.

7. If you want to exit from SecureAnywhere, click Continue. If you want to view the main interface,select Click here to view your Dashboard now (see also "Using the SecureAnywhere interface" onpage 12).

You do not need to do anything further, unless you want to adjust settings. After the initial scan,SecureAnywhere automatically scans your computer daily and constantly monitors activity as you surfthe Internet. You do not need to launch a scan yourself or schedule scans. SecureAnywhere does all thework for you in the background.

To verify that SecureAnywhere is running, look for the Webroot icon in your system tray.

If an important message requires your attention, the icon turns yellow or red. A dialog opens with furtherdetails.

8. If you purchased a multi-user license, you can install SecureAnywhere on other devices.

Note: If you want to uninstall the program later, go to the Windows Start menu (click Start in thesystem tray), point to All Programs, thenWebroot SecureAnywhere, then Tools, then UninstallWebroot. At the prompt, click Yes to continue.

Getting Started

- 7 -

Page 14: SecureAnywhere for PCs User Guide

Creating a Webroot accountBy creating a Webroot account, you can view and manage the security status of your PC from any device withan Internet connection. This status information is available at the SecureAnywhere website(my.webrootanywhere.com). From here, you can manage security across multiple devices from a singlelocation, making it easier to determine if all your devices are protected or if any need attention. For moreinformation, see the SecureAnywhere Management Website User Guide.

Before you begin, do the following:

l Have available the license keycode you used to install SecureAnywhere.

l Make sure you are using one of the following browsers:l Internet Explorer, versions 8 and 9

l Firefox, versions 3.6 and higher

l Chrome or Safari, all versions

To create an account:

1. Open your browser and go to my.webrootanywhere.com.

2. Click Sign up now.

3. Enter your information in the Create an account panel, as described in the following table.

User Guide for PCs

- 8 -

Page 15: SecureAnywhere for PCs User Guide

Create an account

Webroot ProductKeycode

Enter the license keycode you received when you purchased the product.

Email address Enter your email address, which will also be used for your login name.Your account activation confirmation will be sent to this address.

Password Enter a minimum of 9 characters. Your password must contain at least 6alphabetic characters and 3 numeric characters. Your password can belonger than the required 9 characters. It can include special characters,except for angle brackets: < and >. Your password is case sensitive.As you type, the Strength meter shows how secure your password is. Foroptimum security, you should make your password as strong as possible.

Your PersonalSecurity Code

Enter a word or number, which will be used for an extra security stepafter you enter the password during login. Choose a code that is easy toremember, using a minimum of 6 characters. Every time you log in, youmust also enter two random characters of this code. For example, if yourcode is 123456 and it prompts you for the fourth and sixth character, youwould enter 4 and 6. Your Personal Security Code is case sensitive.

Security Question Choose a question from the drop-down list. If you later forget the detailsof your login, you need to provide the answer to this question to retrievethe information.

Security Answer Type an answer to your security question. The Security Answer is case-sensitive.

Getting Started

- 9 -

Page 16: SecureAnywhere for PCs User Guide

4. After you enter account details, click Register Now.SecureAnywhere displays a confirmation message and sends an email to the address you specified. Thismay take a few minutes.Note: If your SecureAnywhere edition includes the Backup & Sync feature, another field appears thatprompts you to select a storage region. Select the region closest to you (U.S., Europe, or Japan), thenclick Register Now again.

5. From your email system, open the confirmation email from Webroot and click the link. Your accountwill not be created until you click this link.

6. When SecureAnywhere prompts you to enter two characters from the Personal Security Code, type therequested characters and click Confirm Registration Now. For example, if your code is 123456 and itprompts you for the fourth and sixth characters, you would enter 4 and 6.

The SecureAnywhere website opens, similar to the following example. The options that appear dependon which SecureAnywhere editions you purchased (AntiVirus, Internet Security Plus, or Complete).

User Guide for PCs

- 10 -

Page 17: SecureAnywhere for PCs User Guide

Note: When you install SecureAnywhere on multiple computers using the same multi-license keycode,their status information automatically displays in this website. For example, if you installedSecureAnywhere on five PCs, the PC Security panel displays "5 PCs Protected."

7. Click Go to PC Security to access status information for your computer.

8. For more information about using the website to manage your devices, see the SecureAnywhereManagement Website User Guide.

Getting Started

- 11 -

Page 18: SecureAnywhere for PCs User Guide

Using the SecureAnywhere interfaceThe SecureAnywhere interface provides access to all functions and settings. To open the main interface, youcan:

l Double-click the Webroot shortcut icon on your desktop:

l Right-click on the Webroot icon from the system tray menu, then click View Status. (For Endpointeditions, click Open.)

l If you cannot locate the system tray icon, open the Windows Start menu, click All Programs (orPrograms), Webroot SecureAnywhere, thenWebroot SecureAnywhere again.

When you open the main interface, it displays the Overview panel.

Along the top of the panel, the main interface includes navigation tabs. The tabs that appear depend on theSecureAnywhere edition you purchased.

User Guide for PCs

- 12 -

Page 19: SecureAnywhere for PCs User Guide

Main Interface tabs

Overview View your system status and manually scan your computer.

PC Security Run custom scans, change shield settings, and manage the quarantine.

Identity & Privacy Protect sensitive data that may be exposed during your onlinetransactions and automatically fill in user names and passwords.  Note: Passwords may not be available in your edition.

Backup & Sync Protect your files by uploading them to Webroot's online repository.Note: Backup & Sync may not be available in your edition.

System Tools Use tools to manage processes and files, view reports, and submit a fileto Webroot Support.Note: The System Cleaner may not be available in your edition.

My Account View your SecureAnywhere account information, check for updates, andrenew or upgrade your subscription.

Getting Started

- 13 -

Page 20: SecureAnywhere for PCs User Guide

Using the system trayThe Webroot icon in the system tray provides quick access to some common SecureAnywhere tasks. By right-clicking on the Webroot icon, you can view the system tray menu. (This menu displays different selections,depending on the SecureAnywhere edition you purchased.)

Note: If the icon does not appear in the system tray, open the main interface, go to Settings, BasicConfiguration, and click in the box for Show a system tray icon. See "Setting general preferences" onpage 156.

If a threat is detected, SecureAnywhere may also open an alert in the system tray. SecureAnywhere takes theappropriate action to quarantine the items. It may also prompt you to take action yourself (see "Running scans "on page 18 and "Managing quarantined items" on page 54).

User Guide for PCs

- 14 -

Page 21: SecureAnywhere for PCs User Guide

Viewing protection statusTo show your computer's overall protection status, the system tray icon and the main interface change colors,as follows:

l Green. Your computer is secure.

l Yellow. One or more messages require your attention.

l Red. One or more critical items require your intervention.

To view details about the current status and settings, open the main interface by right-clicking on the Webrooticon from the system tray menu, then click View Status. (For Endpoint editions, click Open.)

Getting Started

- 15 -

Page 22: SecureAnywhere for PCs User Guide

- 16 -

Page 23: SecureAnywhere for PCs User Guide

- 17 -

Scanning for Malware

When SecureAnywhere scans your computer, it searches for spyware, viruses, and any other threats that mayinfect your computer or compromise your privacy. If it detects a known threat, it moves the item to quarantine,where it is rendered inoperable and can no longer run on your computer. Scans run daily without disrupting yourwork.

To learn more about scanning your PC for malware, see the following topics:

Running scans 18Viewing the latest scan results 18Running a scan immediately 19

Managing detected threats 21Changing the scan schedule 22Changing the scan settings 25

Page 24: SecureAnywhere for PCs User Guide

Running scansScans run automatically every day, at about the same time you installed SecureAnywhere. For example, if youinstalled SecureAnywhere at 8 p.m., it always launches a scan around 8 p.m. It will not disrupt your work, norwill it launch while you play games or watch a movie.

During scans, SecureAnywhere searches all areas where potential threats can hide, including drives, files, andsystem memory. It looks for items that match our threat definitions, match descriptions in our communitydatabase, or exhibit suspicious behavior. If SecureAnywhere detects a threat, it moves the item to quarantinewhere it is rendered inoperable. In quarantine, it can no longer harm your system or steal personal data.

If SecureAnywhere detects a potential threat, it opens an alert that prompts you to make a decision on whetheryou want to allow or block the item. If you aren't sure, we recommend that you block the item. For moreinformation, see "Managing detected threats" on page 21.

See the instructions below for viewing the latest scan results and for running a scan immediately.

Note: You can also run a scan from a remote location. For more information, see the SecureAnywhereManagement Website User Guide.

Viewing the latest scan results1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the PC Security tab. Make sure Scan is selected on the left.The Scan panel shows the statistics of the last scan results.

User Guide for PCs

- 18 -

Page 25: SecureAnywhere for PCs User Guide

Running a scan immediately

Although scans run automatically, you can launch a scan at any time. An immediate scan might be necessary ifyou surfed a high-risk website (networking, music, or adult entertainment), downloaded high-risk items (screensavers, music, or games), or accidentally clicked on a suspicious pop-up advertisement. You can run a scan inone of two ways: from the system tray or from the main window.

To use the system tray:

1. From the system tray, right-click on the Webroot icon .

Scanning for Malware

- 19 -

Page 26: SecureAnywhere for PCs User Guide

2. In the pop-up menu, click Scan Now.

To use the main window:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In either the Overview tab or the Scan tab, click Scan My Computer.

If SecureAnywhere locates threats, it opens a window that guides you through the quarantine process. Itemsmoved to quarantine are rendered inoperable. You do not need to delete them or do anything else. See"Managing quarantined items" on page 54.

User Guide for PCs

- 20 -

Page 27: SecureAnywhere for PCs User Guide

Managing detected threatsIn most cases, SecureAnywhere automatically detects threats and quarantines the items for you. However, if itdetects a potential threat or an item it does not recognize, it prompts you to manage the item. A screen similarto the following example may appear:

To manage threats:

l If you recognize the filename, deselect the Remove checkbox next to the item name (click in the box sothe checkmark is removed). Do not restore the file unless you are absolutely sure that it is legitimate.

l If you DO NOT recognize the filename, keep the item selected (do not click inside the box to removethe checkbox).

SecureAnywhere moves the threat to quarantine, where it is rendered inoperable. You do not need todelete it or do anything else.

After SecureAnywhere moves the threat to quarantine, it launches another scan to make sure your system isclean. See "Managing quarantined items" on page 54.

Scanning for Malware

- 21 -

Page 28: SecureAnywhere for PCs User Guide

Changing the scan scheduleSecureAnywhere launches scans automatically every day, at about the same time you installed the software.You can change the scan schedule to run at different times, change the scanning behavior, or turn off automaticscanning.

To modify scheduled scanning:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In the upper right corner, click Settings.

User Guide for PCs

- 22 -

Page 29: SecureAnywhere for PCs User Guide

3. In the Settings panel, click Advanced Settings.

4. Select Scan Schedule from the left.

Scanning for Malware

- 23 -

Page 30: SecureAnywhere for PCs User Guide

5. In the Scan Schedule panel, you can:

l Disable automatic scanning by clicking the checkbox next to Enable Scheduled Scans sothat the checkmark is removed. Then click Save All.

l Change the scanning intervals by entering new values in the Scan Frequency and Timefields. If you modify the time, the scan will launch when computer resources are available,generally within an hour of the time you select. Then click Save All.

l Change the scanning behavior by selecting or deselecting the checkboxes. When you'redone, click Save All.

See the following table for a description of options.

Scan Schedule options

Scan on bootup if thecomputer is off at thescheduled time

Launches a scheduled scan within an hour after you turn on yourcomputer. If this option is disabled, SecureAnywhere ignores missedscans.

Hide the scan progresswindow duringscheduled scans

Runs scans silently in the background. If this option is disabled, awindow opens and shows the scan progress.

Only notify me if aninfection is foundduring a scheduledscan

Opens an alert only if it finds a threat. If this option is disabled, a smallstatus window opens when the scan completes, whether a threat wasfound or not.

Do not performscheduled scans whenon battery power

Helps conserve battery power. If you want SecureAnywhere to launchscheduled scans when you are on battery power, deselect this option.

Do not performscheduled scans whena full screenapplication or game isopen

Ignores scheduled scans when you are viewing a full-screen application(such as a movie) or a game. Deselect this option if you want scheduledscans to run anyway.

Randomize the time ofscheduled scans up toone hour for distributedscanning

Determines the best time for scanning (based on available systemresources) and runs the scan within an hour of the scheduled time. If youwant to force the scan to run at the exact time scheduled, deselect thisoption.

Perform a scheduledQuick Scan instead ofa Deep Scan

Runs a quick scan of memory. We recommend that you keep this optiondeselected, so that deep scans run for all types of malware in alllocations.

User Guide for PCs

- 24 -

Page 31: SecureAnywhere for PCs User Guide

Changing the scan settingsScan settings provide advanced users with a little more control over scanning performance.

To change the scan settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In the upper right corner, click Settings.

Scanning for Malware

- 25 -

Page 32: SecureAnywhere for PCs User Guide

3. In the Settings panel, click Advanced Settings.

4. Select Scan Settings from the left.

5. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (checkthe box). When you’re done, click Save All.

User Guide for PCs

- 26 -

Page 33: SecureAnywhere for PCs User Guide

The following table describes the scan settings.

Scan Setting options

Enable RealtimeMaster Boot Record(MBR) Scanning

Protects your computer against master boot record (MBR) infections. AnMBR infection can modify core areas of the system so that they loadbefore the operating system and can infect the computer. We recommendthat you keep this option selected. It adds only a small amount of time tothe scan.

Enable EnhancedRootkit Detection

Checks for rootkits and other malicious software hidden on your disk orin protected areas. Spyware developers often use rootkits to avoiddetection and removal. We recommend that you keep this optionselected. It adds only a small amount of time to the scan.

Enable “right-click”scanning in WindowsExplorer

Enables an option for running a full, file-by-file scan of the currentlyselected file or folder in the Windows Explorer right-click menu. Thisoption is helpful if you downloaded a file and want to quickly scan it.

Update the currentlyscanned folderimmediately asscanned

Displays a full list of files as SecureAnywhere scans each one. If youwant to increase scan performance slightly, deselect this option so thatfile names only update once per second on the panel. SecureAnywherewill still scan all files, just not take the time to show each one on thescreen.

Favor low memoryusage over fastscanning

Reduces CPU usage during scans, but scans will also run a bit slower.Deselect this option to run faster scans.

Save non-executablefile details to scan logs

Saves all file data to the scan log, resulting in a much larger log file.Keep this option deselected to save only executable file details to the log.

Show the“Authenticating Files”pop-up when a newfile is scanned on-execution

Opens a small dialog whenever you run a program for the first time.Keep this option deselected if you do not want to see this dialog.

Scan archived files Scans compressed files in zip, rar, cab, and 7-zip archives.

Scanning for Malware

- 27 -

Page 34: SecureAnywhere for PCs User Guide

- 28 -

Page 35: SecureAnywhere for PCs User Guide

- 29 -

Shielding Your PC

Shields monitor functions related to web browsing and system activity. If a suspicious item tries downloading orrunning on your computer, the shields automatically block and quarantine the item. For some types of shields,an alert asks if you want to continue the download or block it.

To manage shielding activities, see the following topics:

Managing shields 30Changing Realtime shield settings 32Changing Behavior shield settings 35Changing Core System shield settings 38Changing Web Threat shield settings 41Using Web Threat protection 44Surfing websites 44Using search engines 45

Page 36: SecureAnywhere for PCs User Guide

Managing shieldsShields constantly monitor activity while you surf the Internet and work on your computer. The shields protectyour computer from malware and viruses, as well as settings for your browser and the Windows system.SecureAnywhere includes these types of shields:

l Realtime shield. Controls how threats are blocked and quarantined on your computer.

l Behavior shield. Blocks applications and processes that exhibit suspicious behavior.

l Core System shield. Monitors the computer system structures and makes sure malware has nottampered with them.

l Web Threat shield. Protects your system as you surf the Internet and blocks suspicious files that try todownload.

l USB shield. Monitors an installed USB flash drive for threats and blocks any threats that it finds.

l Offline shield. Protects your system from threats while your computer is not connected to the Internet.

l Zero Day shield. Monitors your system for previously unknown vulnerabilities (in which the attack hasbeen known for "zero days").

Shields run in the background without disrupting your work. If a shield detects an item that it classifies as apotential threat or does not recognize, it opens an alert. The alert asks if you want to allow the item to run or ifyou want to block it. If you recognize the file name and you are purposely downloading it (for example, youwere in the process of downloading a new toolbar for your browser), click Allow to continue. If you were nottrying to download anything, you should click Block. As you surf Internet sites, you could be targeted for adrive-by download, where an unwanted program launches and silently installs on your computer as you viewpages.

The shields are preconfigured, based on our recommended settings. You do not need to configure any settingsyourself unless you are an advanced user and would like to modify shield behavior.

To view shield status or to disable shields:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the PC Security tab.

3. Click Shields on the left.The Shields panel opens. A green button next to the shield name indicates the shield is on. Werecommend that you keep all shields enabled; however, you can disable a shield by clicking the greenbutton, as indicated in the following example.

User Guide for PCs

- 30 -

Page 37: SecureAnywhere for PCs User Guide

Shielding Your PC

- 31 -

Page 38: SecureAnywhere for PCs User Guide

Changing Realtime shield settingsThe Realtime shield blocks known threats that are listed in Webroot’s threat definitions and in our communitydatabase. If the shield detects a suspicious file, it opens an alert and prompts you to block or allow the item. Ifit detects a known threat, it immediately blocks and quarantines the item before it causes damage to yourcomputer or steals your information.

Webroot already configured this shield with our recommended settings, but you can adjust the settings if youwant.

To change Realtime shield settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In the upper right corner, click Settings.

User Guide for PCs

- 32 -

Page 39: SecureAnywhere for PCs User Guide

3. In the Settings panel, click Advanced Settings.

4. Click Realtime Shield on the left.

5. If you want to change a setting (see the following table), select its checkbox to disable it (uncheck thebox) or activate it (check the box). When you’re done, click Save All.

Shielding Your PC

- 33 -

Page 40: SecureAnywhere for PCs User Guide

Note: We recommend that you keep Webroot’s default settings. If you make changes and decide youwant to return to the recommended settings, click the Reset to Defaults button.

The following table describes the shield options.

Realtime shield settings

Enable PredictiveOffline Protectionfrom the centralSecureAnywheredatabase

Downloads a small threat definition file to your computer, which protectsyour computer even when it’s offline. We recommend that you keep thisoption selected.

Remember actions onblocked files

Remembers how you responded in an alert (allowed a file or blocked it).It won’t prompt you again when it encounters the same file. If this optionis deselected, SecureAnywhere opens an alert every time it encountersthe file in the future. (If you blocked a file and want it restored, you canretrieve it from quarantine.)

Automaticallyquarantine previouslyblocked files

Opens an alert when it encounters a threat. It gives you the option ofblocking it and sending it to quarantine. If this option is deselected, youmust run a scan manually to remove a threat.

Automatically blockfiles when detected onexecution

Automatically blocks threats and sends them to quarantine. If this optionis deselected, you must respond to alerts about detected threats.

Scan files whenwritten or modified

Scans any new or modified files that you save to disk. If this option isdeselected, it ignores new file installations (however, it will still alertyou if a threat tries to launch).

Block threatsautomatically if nouser is logged in

Stops threats from executing even when you are logged off. Threats aresent to quarantine without notification.

User Guide for PCs

- 34 -

Page 41: SecureAnywhere for PCs User Guide

Changing Behavior shield settingsThe Behavior shield analyzes the applications and processes running on your computer. If it detects asuspicious file, it opens an alert and prompts you to block or allow the item. If it detects a known threat, itimmediately blocks and quarantines the item before it causes damage to your computer or steals yourinformation.

Webroot already configured this shield with our recommended settings, but you can adjust the settings if youwant.

To change Behavior shield settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In the upper right corner, click Settings.

Shielding Your PC

- 35 -

Page 42: SecureAnywhere for PCs User Guide

3. In the Settings panel, click Advanced Settings.

4. Click Behavior Shield on the left.

5. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (checkthe box). When you’re done, click Save All.

User Guide for PCs

- 36 -

Page 43: SecureAnywhere for PCs User Guide

Note: We recommend that you keep Webroot’s default settings. If you make changes and decide youwant to return to the recommended settings, click the Reset to Defaults button.

The following table describes the shield options.

Behavior shield settings

Assess the intent ofnew programs beforeallowing them toexecute

Watches the program’s activity before allowing it to execute. If itappears okay, SecureAnywhere allows it to launch and continues tomonitor its activity.

Enable advancedbehavior interpretationto identify complexthreats

Employs a thorough analysis of a program to examine its intent. (Forexample, a malware program might perform suspicious activities likemodifying a registry entry, then sending an email.)

Track the behavior ofuntrusted programs foradvanced threatremoval

Watches programs that have not yet been classified as legitimate or asmalware.

Automatically performthe recommendedaction instead ofshowing warningmessages

Does not prompt you to allow or block a potential threat.SecureAnywhere will determine how to manage the item.

Warn if untrustedprograms attempt low-level systemmodifications whenoffline

Opens an alert if an unclassified program attempts to make changes toyour system when you are offline. (SecureAnywhere cannot check itsonline threat database if you are disconnected from the Internet.)

Shielding Your PC

- 37 -

Page 44: SecureAnywhere for PCs User Guide

Changing Core System shield settingsThe Core System shield monitors the computer system structures and makes sure malware has not tamperedwith them. If it detects a suspicious file trying to make changes, it opens an alert and prompts you to block orallow the item. If it detects a known threat, it immediately blocks and quarantines the item before it causesdamage to your computer or steals your information.

Webroot already configured this shield with our recommended settings, but you can adjust the settings if youwant.

To change Core System shield settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In the upper right corner, click Settings.

User Guide for PCs

- 38 -

Page 45: SecureAnywhere for PCs User Guide

3. In the Settings panel, click Advanced Settings.

4. Click Core System Shield on the left.

5. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (checkthe box). When you’re done, click Save All.

Shielding Your PC

- 39 -

Page 46: SecureAnywhere for PCs User Guide

Note: We recommend that you keep Webroot’s default settings. If you make changes and decide youwant to return to the recommended settings, click the Reset to Defaults button.

The following table describes the shield options.

Core System shield settings

Assess systemmodifications beforethey are allowed totake place

Intercepts any activity that attempts to make system changes, such as anew service installation.

Detect and repairbroken systemcomponents

Locates corrupted components, such as a broken Layered ServiceProvider (LSP) chain or a virus-infected file, then restores the componentor file to its original state.

Prevent untrustedprograms frommodifying kernelmemory

Stops unclassified programs from changing the kernel memory. Thekernel is the central component of most computer operating systems. Itacts as a bridge between applications and data processing done at thehardware level.

Prevent untrustedprograms frommodifying systemprocesses

Stops unclassified programs from changing the system processes.

Verify the integrity ofthe LSP chain andother system structures

Monitors the Layered Service Provider (LSP) chain and other systemstructures to make sure malware does not corrupt them.

Prevent any programfrom modifying theHOSTS file

Stops spyware from attempting to add or change the IP address for awebsite in the hosts file. It opens an alert where you can block or allowthe changes. The hosts file is a Windows file that helps direct yourcomputer to a website using Internet Protocol (IP) addresses.

User Guide for PCs

- 40 -

Page 47: SecureAnywhere for PCs User Guide

Changing Web Threat shield settingsThe Web Threat shield protects your system as you surf the Internet. If it detects a website that may be athreat, it opens an alert that allows you to decide whether you want to block the site or continue despite thewarning. When you use a search engine, this shield analyzes all the links on the search results page and thendisplays an image next to each link that signifies whether it’s a trusted site or a potential risk (see "Using WebThreat protection" on page 44).

Webroot already configured this shield with our recommended settings, but you can adjust the settings if youwant.

To change Web Threat shield settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In the upper right corner, click Settings.

Shielding Your PC

- 41 -

Page 48: SecureAnywhere for PCs User Guide

3. In the Settings panel, click Advanced Settings.

4. ClickWeb Threat Shield on the left.

5. If you want to create a list of websites to always block or always allow, click View Websites. In thedialog, enter a website name in the field (in the form of www.sitename.com) and click Add Website. In

User Guide for PCs

- 42 -

Page 49: SecureAnywhere for PCs User Guide

the table, select whether you want to allow this website (click the Allow radio button) or you want toblock it (click the Block radio button). When you’re done, click Close.

6. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (checkthe box). When you’re done, click Save All.

Note: We recommend that you keep Webroot’s default settings. If you make changes and decide youwant to return to the recommended settings, click the Reset to Defaults button.

The following table describes the shield options.

Web Threat shield settings

Analyze search engineresults and identifymalicious websitesbefore visitation

When you use a search engine, SecureAnywhere analyzes all linksdisplayed on the search results page by running the URLs through itsmalware-identification engine. It then displays an image next to each linkthat signifies if the site is safe (green checkmark) or a potential risk (redX).

Enable deep contentanalysis

Analyzes all data traffic on your computer as you visit websites. Ifthreats try to install, it blocks their activity.

Look for malware onwebsites beforevisitation

When you enter the URL for a website in your browser’s address bar orclick on a link to a site, SecureAnywhere runs the URL through itsmalware-identification engine. If the site is associated with malware, itblocks it from loading in your browser.

Look for exploits inwebsite content beforevisitation

Looks for cross-site scripting attacks that may try to redirect you to adifferent website.

Shielding Your PC

- 43 -

Page 50: SecureAnywhere for PCs User Guide

Using Web Threat protectionTo detect websites associated with potential threats, the Web Threat shield analyzes URLs (web addresses) asfollows:

l When you enter the URL for a website or click a link to a site, SecureAnywhere runs the URL throughits malware-identification engine. If the site is associated with malware, the Web Threat shield blocksthe site from loading in your browser.

l When you use a search engine, SecureAnywhere analyzes all links displayed on the search results pageby running the URLs through its malware-identification engine. It then displays an image next to eachlink that signifies its risk level.

Surfing websites

If you attempt to access a website that is associated with a known threat, phishing attempts, or exhibited somequestionable behavior, the Web Threat shield displays an alert before the website loads.

We recommend that you click Close to navigate away from this page. However, if you still want to access thesite despite the warning, click Allow. The website is then added to the "allowed" filter and will load the pagedirectly the next time. If you want to change the website filter, see "Changing Web Threat shield settings" onpage 41.

User Guide for PCs

- 44 -

Page 51: SecureAnywhere for PCs User Guide

Using search engines

When you use a search engine, the Web Threat shield displays a rating next to the link for each search result.A green checkmark next to the link indicates the site is safe to access:

A red X displays next to the link if the site is known for spreading malware:

Shielding Your PC

- 45 -

Page 52: SecureAnywhere for PCs User Guide

- 46 -

Page 53: SecureAnywhere for PCs User Guide

- 47 -

Using Firewall Protection

You can use the Webroot firewall to monitor data traffic and block potential threats. The Webroot firewall,when used with the your computer’s built-in Windows firewall, provides thorough protection for your computersystem and your security. 

To adjust firewall protection, see the following topics:

Managing the firewall 48Changing firewall alert settings 49Managing network applications 50

Page 54: SecureAnywhere for PCs User Guide

Managing the firewallThe SecureAnywhere firewall monitors data traffic traveling out of your computer ports. It looks for untrustedprocesses that try to connect to the Internet and steal your personal information. It works with the Windowsfirewall, which monitors data traffic coming into your computer. With both the SecureAnywhere and Windowsfirewall turned on, your data has complete inbound and outbound protection.

You should not turn off either the Windows firewall or the SecureAnywhere firewall. If they are disabled, yoursystem is open to many types of threats whenever you connect to the Internet or to a network. These firewallscan block malware, hacking attempts, and other online threats before they can cause damage to your system orcompromise your security.

The SecureAnywhere firewall is preconfigured to filter traffic on your computer. It works in the backgroundwithout disrupting your normal activities. If the firewall detects any unrecognized traffic, it opens an alertwhere you can block the traffic or allow it to proceed.

To view firewall status or to disable the firewall:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the PC Security tab, then click Firewall on the left.The Firewall panel opens. The green button indicates the shield is on. We recommend that you keep thefirewall enabled; however, you can disable it by clicking the green button.

User Guide for PCs

- 48 -

Page 55: SecureAnywhere for PCs User Guide

Changing firewall alert settingsYou can adjust how the firewall manages processes and whether it should open an alert when it does notrecognize a process.

To change firewall alert settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the PC Security tab.

3. Click Firewall on the left.

4. Click a radio button to select an alerting method.

Using Firewall Protection

- 49 -

Page 56: SecureAnywhere for PCs User Guide

Managing network applicationsTo protect your computer from hackers and other threats, the firewall monitors processes that attempt to accessthe Internet. It also monitors the ports used for communicating with the Internet. You have control over whetherSecureAnywhere will allow or block certain processes and port communications.

To change settings for active connections:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the PC Security tab.

3. Click Firewall on the left.

4. At the bottom of the panel, click View Network Applications.

The Network Applications panel opens.

User Guide for PCs

- 50 -

Page 57: SecureAnywhere for PCs User Guide

5. Click on a radio button to allow or block a process, or to allow or close a port.

Using Firewall Protection

- 51 -

Page 58: SecureAnywhere for PCs User Guide

- 52 -

Page 59: SecureAnywhere for PCs User Guide

- 53 -

Managing Quarantine

The Webroot quarantine is a holding area for potential threats found during scan and shielding activities. Itemsin quarantine are rendered inoperable and cannot harm your computer. You do not need to delete them, unlessyou want to conserve disk space. You can also restore items from quarantine, if necessary.

To manage file detection and perform some advanced quarantining functions, see the following topics:

Managing quarantined items 54Managing file detection 56Using antimalware tools 58

Page 60: SecureAnywhere for PCs User Guide

Managing quarantined itemsOnce items are moved to quarantine, they are disabled and cannot harm your computer. However, you maywant to delete or restore quarantined items in the following circumstances:

l If you want to conserve disk space, you can delete the items permanently.

l If you discover that a program is not working correctly without the quarantined item, you can restore it.In rare cases, a piece of spyware is an integral part of a legitimate program and is required to run thatprogram.

To view and manage items in quarantine:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the PC Security tab.

3. Click Quarantine on the left, then click View Quarantine.

The Quarantine panel opens.

User Guide for PCs

- 54 -

Page 61: SecureAnywhere for PCs User Guide

4. If you want to delete or restore the item, click in its checkbox to select it. You can then do either of thefollowing:

l If you want to remove the item permanently, click Erase. Be aware that after erasing it,you can never restore the item.

l If you want to move the item back to its original location, click Restore. When an item isrestored, SecureAnywhere will no longer detect it during scans. If you want the item to bedetected again in the future, you can change its detection rules.

Managing Quarantine

- 55 -

Page 62: SecureAnywhere for PCs User Guide

Managing file detectionIf you want more control over scans and shielding behavior, you can use Detection Configuration to specify oneof the following actions:

l Allow. Ignore a file during scans and shielding.

l Block. Stop a file from executing or being written to your computer.

l Monitor. Watch the program to determine if it is legitimate or related to malware.

Detection configuration acts as an override to SecureAnywhere’s default scanning and shielding behavior.

To manage file detection:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the PC Security tab.

3. Click Quarantine on the left, then click Configure under Detection Configuration.

The Detection Configuration panel opens.

User Guide for PCs

- 56 -

Page 63: SecureAnywhere for PCs User Guide

4. You can add executable files to this list. (Executable files typically have an extension of exe, dll, sys,drv, or com.) To add files, click the Add File button. You can also drag and drop a file from Explorer.The file name appears in the Threat column. (If SecureAnywhere detected other copies of this file withdifferent file names, it only shows the file name that it last detected.)

5. In the right column, select the radio button for either Allow, Block, orMonitor. If you want to clear thelist, click the Remove all button.

Managing Quarantine

- 57 -

Page 64: SecureAnywhere for PCs User Guide

Using antimalware toolsSecureAnywhere provides tools for manually removing threats and for performing actions associated withthreat removal. You should only use these tools if you are an advanced user. These tools allow you to:

l Target a file for scanning and removal, while also removing its associate registry links (if any).

l Launch a removal script with the assistance of Webroot Support.

l Reboot after removing a threat yourself or using a removal script.

l Reset your wallpaper, screensavers, and system policies.

To access and use these tools:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the PC Security tab.

3. Click Quarantine on the left, then click View Tools.

The Antimalware Tools panel opens.

User Guide for PCs

- 58 -

Page 65: SecureAnywhere for PCs User Guide

The following table describes the shield options.

Antimalware tools

Reset desktopwallpaper

If your computer was recently infected with malware that changed yourwallpaper, click the checkbox and click Run Tools.

Reset screensaver If your computer was recently infected with malware that changed yourscreensaver, click the checkbox and click Run Tools.

Reset system policies If your computer was recently infected with malware that changed yoursystem policies, click the checkbox and click Run Tools.

Reboot in Safe Mode If Webroot Support instructs you to reboot your computer in Safe Mode,click the checkbox and click Run Tools.

Perform an immediatesystem reboot

To reboot your system after threat removal, click the checkbox and clickRun Tools.

Manual ThreatRemoval

To scan a specific file for threats, click Select a file. In the WindowsExplorer dialog, select a file and click Save. SecureAnywhere launchesa scan. When it’s complete, reboot your system.

Removal Script After Webroot Support sends you a removal script, save it to yourcomputer. Click Select Script... to launch the tool.

Managing Quarantine

- 59 -

Page 66: SecureAnywhere for PCs User Guide

- 60 -

Page 67: SecureAnywhere for PCs User Guide

- 61 -

Managing Identity Protection

You can use the Identity shield to safely surf the Internet and enter sensitive data in applications. The Identityshield watches for any suspicious activity that may indicate an outside program is attempting to stealinformation from your computer.

To configure advanced Identity shield protection, see the following topics:

Managing Identity Protection 62Changing Identity Protection settings 63Managing protected applications 66Managing protected websites 69

Page 68: SecureAnywhere for PCs User Guide

Managing Identity ProtectionThe Identity shield protects you from identity theft and financial loss. It ensures that your sensitive data isprotected, while safe-guarding you from keyloggers, screen-grabbers, and other information-stealingtechniques.

The Identity shield supports the following browsers:

l Internet Explorer 7.0 and higher (32-bit only)

l Mozilla Firefox 3.6 and higher (32-bit only)

l Google Chrome 10 and higher

l Opera 9 and higher (32-bit only)

To view the Identity shield status or to disable the Identity shield:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Identity & Privacy tab.

3. Click Identity Shield on the left.The Identity Shield panel opens. The green button indicates the shield is on. We recommend that youkeep the Identity Shield enabled; however, you can disable it by clicking the green button.

User Guide for PCs

- 62 -

Page 69: SecureAnywhere for PCs User Guide

Changing Identity Protection settingsThe Identity shield protects sensitive data that may be exposed during your online transactions. Webroot hasalready configured the Identity shield for you. However, you can change the behavior of the Identity shield andcontrol what it blocks.

To change Identity shield settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In the upper right corner, click Settings.

Managing Identity Protection

- 63 -

Page 70: SecureAnywhere for PCs User Guide

3. In the Settings panel, click Advanced Settings.

4. Click Identity Shield on the left.

5. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (checkthe box). When you’re done, click the Save All button.

User Guide for PCs

- 64 -

Page 71: SecureAnywhere for PCs User Guide

Note: We recommend that you keep Webroot’s default settings. If you make changes and decide youwant to return to the recommended settings, click the Reset to Defaults button.

The following table describes the shield options.

Identity shield settings

Look for identitythreats online

Analyzes websites as you browse the Internet or open links. If the shielddetects any malicious content, it blocks the site and opens an alert.

Analyze websites forphishing threats

Analyzes websites for phishing threats as you browse the Internet oropen links. If the shield detects a phishing threat, it blocks the site andopens an alert. Phishing is a fraudulent method used by criminals to stealpersonal information. Typical scams might include websites designed toresemble legitimate sites, such as PayPal or a banking organization,which trick you into entering your credit card number.

Verify websites whenvisited to determinelegitimacy

Analyzes the IP address of each website to determine if it has beenredirected or is on our blacklist. If the shield detects an illegitimatewebsite, it blocks the site and opens an alert.

Verify the DNS/IPresolution of websitesto detect Man-in-the-Middle attacks

Looks for servers that could be redirecting you to a malicious website(man-in-the-middle attack). If the shield detects a man-in-the-middleattack, it blocks the threat and opens an alert.

Block websites fromcreating high risktracking information

Blocks third-party cookies from installing on your computer if thecookies originate from malicious tracking websites. Cookies are smallbits of text generated by a web server and then stored on your computerfor future use. Cookies can contain everything from tracking informationto your personal preferences.

Prevent programs fromaccessing protectedcredentials

Blocks programs from accessing your login credentials (for example,when you type your name and password or when you request a website toremember them).

Warn before blockinguntrusted programsfrom accessingprotected data

Opens an alert any time malware attempts to access data, instead ofblocking known malware automatically. (This option is for technicalusers only; we recommend that you keep this option disabled so theprogram does not open numerous alerts.)

Allow trusted screencapture programsaccess to protectedscreen contents

Allows you to use legitimate screen capture programs, no matter whatcontent is displayed on your screen.

Managing Identity Protection

- 65 -

Page 72: SecureAnywhere for PCs User Guide

Managing protected applicationsYou can provide additional security for software applications that may contain confidential information, such asInstant Messaging clients or tax preparation software. By protecting these applications, you secure themagainst information-stealing Trojans like keyloggers, man-in-the-middle attacks, and clipboard stealers. Youcan add any applications to the Protected Applications list and assign them to one of the protection levels:

l Protect. “Protected applications” are secured against information-stealing malware, but also have fullaccess to data on the system. You might want to add financial management software to the category.When you run a protected application, the Webroot icon in the system tray displays a padlock:

l Allow. “Allowed applications” are not secured against information-stealing malware, and also have fullaccess to protected data on the system. Many applications unintentionally access protected screencontents or keyboard data without malicious intent when running in the background. If you trust anapplication that is currently marked as “Deny,” you can change it to “Allow.”

l Deny. “Denied applications” cannot view or capture protected data on the system, but can otherwiserun normally.

As you work on your computer, SecureAnywhere automatically adds web browsers to the ProtectedApplications list and assigns them to the “protected” status.

To manage the application list and specify levels of protection:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Identity & Privacy tab.

3. Click Identity Shield on the left, then click View/Edit Protected Applications.

User Guide for PCs

- 66 -

Page 73: SecureAnywhere for PCs User Guide

The Protected Applications panel opens. This panel shows the web browsers on your system and anyother applications you added to the list.

Managing Identity Protection

- 67 -

Page 74: SecureAnywhere for PCs User Guide

4. In the row for the application you want to modify, click the radio button for Protect, Allow, or Deny.(To include another application in this list, click Add Application, then select an executable file.)

5. When you’re done, click Close.

User Guide for PCs

- 68 -

Page 75: SecureAnywhere for PCs User Guide

Managing protected websitesThe Identity shield already includes the recommended security settings for specific types of websites. Ifdesired, you can adjust security for a website to one of the following levels:

l None. Provides unfiltered access to all potentially malicious content. (Not recommended.)

l Low. Protects stored data and identifies malware in real time. You may want to use this setting if youhave an application that does not work properly when the security level is set to Medium or higher.

l Medium. Protects your stored data while also providing software compatibility. You may want to usethis setting if you have an application that does not work properly when the security level is set to Highor Maximum.

l High. Provides strong protection against threats, while still enabling screen accessibility for impairedusers (for example, allows text-to-speech programs to run normally). 

l Maximum. Provides maximum protection against threats, but blocks screen accessibility for impairedusers. When you load a secured website, the Webroot icon in the system tray displays a padlock:

Note: The Identity shield only protects a secured website when the browser window is active in theforeground window (the padlock is shown in the tray icon). For full protection from screen grabbers,information-stealing Trojans, and other threats, make sure the browser window is in the foreground andthe padlock is displayed in the tray icon. If the Identity shield encounters a website that may be a threat,it opens an alert. You can decide whether you want to stay secure (click Block) or continue despite thewarning (click Allow).

To manage settings for protected websites:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Identity & Privacy tab.

3. Click Identity Shield on the left.

4. Click View/Edit Protected Websites.

Managing Identity Protection

- 69 -

Page 76: SecureAnywhere for PCs User Guide

The Protected Websites panel opens.

User Guide for PCs

- 70 -

Page 77: SecureAnywhere for PCs User Guide

5. In the Protected Websites table, click in the row for the type of website you want to adjust. To includean individual site, enter the address in the field at the top of the dialog, then click Add Website.

6. Adjust the slider for minimum to maximum protection configuration. As an alternative, you can alsoselect the individual protection options by clicking on the green checkmark or red X. (A greencheckmark indicates the option is on; a red X indicates the option is off.) When you’re done, click Save.

The following table describes the protection options.

Website protection options

Block phishing andknown maliciouswebsites

Alerts you to phishing sites and other malicious sites listed in ourWebroot database. Phishing is a fraudulent method used by criminals tosteal personal information. Typical scams might include websitesdesigned to resemble legitimate sites, such as PayPal or a bankingorganization, which trick you into entering your credit card number.

Protect cookies andsaved website data

Alerts you if a malicious program attempts to gather personal data fromcookies installed on your computer. Cookies are small bits of textgenerated by a web server and then stored on your computer for futureuse. Cookies can contain everything from tracking information to yourpersonal preferences.

Detect and preventman-in-the middleattacks

Alerts you if a server is redirecting you to a malicious website (man-in-the-middle attack). This is a method of intercepting communicationsbetween two systems and stealing data.

Protect againstkeyloggers

Stops keyloggers from recording keystrokes on your computer.Keyloggers may monitor emails, chat room dialogue, instant messagedialogue, websites visited, usernames, passwords, programs run, and anyother typed entries. They have the ability to run in the background, hidingtheir presence.

Protect sensitiveclipboard data

Stops malware programs from capturing clipboard data. The clipboard isa utility that allows you to cut and paste stored data between documentsor applications.

Protect against URLgrabbing attacks

Hides your web browsing activity from malware that attempts to log thewebsites you visit.

Protect browsercomponents fromexternal access

Hides your web browsing activity from malware that attempts to modifyyour browser with memory injection and other behind-the-scenes attacks.

Managing Identity Protection

- 71 -

Page 78: SecureAnywhere for PCs User Guide

Website protection options

Protect against Man-in-the-Browser attacks

Blocks a malicious toolbar from stealing data. A man-in-the-browserattack is a Trojan that infects a web browser. It can modify pages andthe content of your transactions without being detected.

Isolate untrustedbrowser add-ons fromdata

Blocks a browser add-on (browser helper object) from stealing data.While most browser add-ons are legitimate, some can display ads, trackyour Internet activity, or hijack your home page.

Block browser processmodification attempts

Analyzes browser memory to see if code injection is taking place.

Protect against screengrabbing attacks

Blocks a malicious program from viewing and capturing your screencontent.

Block suspiciousaccess to browserwindows

Blocks a malicious program from viewing and capturing data inWindows components.

User Guide for PCs

- 72 -

Page 79: SecureAnywhere for PCs User Guide

- 73 -

Managing Passwords

If you purchased a SecureAnywhere edition that includes password management, you can use an additionalcomponent for managing passwords and profiles online. Once you define your personal information andpasswords in SecureAnywhere, you can automatically log in to websites or populate fields in web forms,saving you the hassle of manually entering your personal data and credit card numbers.

Note: This section provides a quick overview of password management. For further instructions, see theSecureAnywhere Management Website User Guide.

To learn about password management, see the following topics:

Using password management 74Downloading the passwords component 75

Page 80: SecureAnywhere for PCs User Guide

Using password managementIf you purchased a SecureAnywhere edition that includes password management, you can create a securepassword for all your website transactions, automatically remember your user names and passwords, andautomatically fill in web forms. You never need to remember multiple login names and passwords again.

Note: For complete instructions on using password management in your browser, see theSecureAnywhere Management Website User Guide.

To get started with password management:

1. Open Internet Explorer, Chrome, or Firefox and look for the Webroot icon in the toolbar. If it does notappear, you must download the passwords component (see "Downloading the passwords component" onpage 75).

2. From your browser's toolbar, click on the Webroot icon to log in to password management (use yourWebroot account credentials; see "Creating a Webroot account" on page 8). When you are logged in,SecureAnywhere detects information you enter in web forms and prompts you to save the data for futureuse.

3. Access a website that requires a login or personal data in web forms. After defining login credentialsand personal information, you can log in to your Webroot account from the toolbar each time you open abrowser.See the SecureAnywhere Management Website User Guide for complete instructions.

User Guide for PCs

- 74 -

Page 81: SecureAnywhere for PCs User Guide

Downloading the passwords componentThe passwords component should install along with your SecureAnywhere installation; however, it might notinstall in some situations.

To check if the passwords component downloaded:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Identity & Privacy tab.

3. Click Password Management on the left.If a Download and Install button appears, click the button to install the component.

If the passwords component has successfully installed, the Password Management panel looks similar tothe following example.

Managing Passwords

- 75 -

Page 83: SecureAnywhere for PCs User Guide

- 77 -

Managing Backup & Sync

If you purchased a SecureAnywhere edition that includes Backup & Sync, you can synchronize important fileswith your online SecureAnywhere account, as well as with other computers and mobile devices. You can alsoschedule regular backups to your account, which is accessible from the Backup & Sync page of theSecureAnywhere website.

Note: For further instructions about using Backup & Sync in your online account or on your mobiledevice, see the Webroot SecureAnywhere Help and Product Guides page.

To learn about Backup & Sync, see the following topics:

Using Backup & Sync 78Downloading the Backup & Sync component 79Synchronizing files 81Changing sync settings 85Adding sync folders 88Synchronizing folders with other computers 92Removing a folder from synchronization 95Backing up files 97Changing backup settings 101Changing backup filters 104Changing the backup schedule 107Checking file status 109

Page 84: SecureAnywhere for PCs User Guide

Using Backup & SyncIf your SecureAnywhere edition includes Backup & Sync, you can protect your important files and photos asfollows:

l Storing files in the Anywhere folder or in your own sync folders. You can use Webroot'spreconfigured folder called the Anywhere folder or you can create your own sync folders. Any files youplace in these folders are automatically synchronized in your account, to any other computers withshared folders, and to mobile devices with the Backup & Sync app installed.

SecureAnywhere constantly monitors the Anywhere folder and other sync folders. If it detects a change(an edited file, a new file, or a deleted file), it immediately makes the same change to your onlineaccount, to shared folders on other computers, and to mobile devices with the Backup & Sync appinstalled. If you are working offline, SecureAnywhere automatically picks up changes the next time youconnect to the Internet.

If SecureAnywhere detects an edited file, it does not overwrite the original version stored in youraccount. Instead, it uploads the latest version and makes a copy of the original file. If necessary, you canrevert back to previous versions (up to five). If you save changes a sixth time, your most recent versionis saved and the oldest version is removed. For more information, see the SecureAnywhere ManagementWebsite User Guide.

To learn more about the preconfigured Anywhere folder, see "Synchronizing files" on page 81. To createsync folders of your own, see "Adding sync folders" on page 88.

l Backing up files. Instead of synchronizing files with multiple devices, you can simply back them up. Forexample, you may want to back up tax returns, old photos, and a scanned copy of your passport. Thesetypes of documents won’t change and don’t need to be kept in synchronization with other computers.

To learn more about backups, see "Backing up files" on page 97.

User Guide for PCs

- 78 -

Page 85: SecureAnywhere for PCs User Guide

Downloading the Backup & Sync componentTo begin using Backup & Sync, you must download its component to your computer.

To download the component:

1. If you have not yet created a Webroot account, see "Creating a Webroot account" on page 8.This is where you will access your files stored in the cloud.

2. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

3. Click the Backup & Sync tab, then click the Log in button.

4. If prompted, enter your Webroot account credentials (user name and password). When the downloadcompletes, the Backup & Sync panel looks like the following example.

Managing Backup & Sync

- 79 -

Page 86: SecureAnywhere for PCs User Guide

By default, synchronization of the Anywhere folder is turned on. For more information, see"Synchronizing files" on page 81.

Backups are not turned on by default. To configure backups, see "Backing up files" on page 97.

User Guide for PCs

- 80 -

Page 87: SecureAnywhere for PCs User Guide

Synchronizing filesWebroot includes one preconfigured folder for synchronization, called the Anywhere folder. It resides underyour personal Documents folder in Windows. Any files you put in the Anywhere folder are automaticallysynchronized with your online account (my.webrootanywhere.com) and with shared folders on other computersor mobile devices in your account.

To synchronize files using the Anywhere folder:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Backup & Sync tab, and make sure Backup & Sync is selected at the left.

3. Click Open Anywhere Folder.

Windows Explorer opens to the Webroot Anywhere folder.

4. Copy files or folders into the Webroot Anywhere folder.

The files are instantly synchronized to your online SecureAnywhere account and to other shared folders

Managing Backup & Sync

- 81 -

Page 88: SecureAnywhere for PCs User Guide

on other computers (if you configured them). In Windows Explorer, icons next to the files and foldersindicate the status of the synchronization:

l Synchronized:

l Sync pending:

l Not synchronized:

Note: Some files may fail to synchronize because their storage size is larger than theupload limit. You can adjust the limit in the Do not upload files larger than field in theSync Settings panel. See "Changing sync settings" on page 85.

5. To see the amount of used storage in your account, look at the status bar at the bottom of the Backup &Sync panel. If you want to check that your files were successfully copied, access your online account byclickingWeb Console.

User Guide for PCs

- 82 -

Page 89: SecureAnywhere for PCs User Guide

6. When your browser opens to my.webrootanywhere.com, log in to your account, click Go to Backup &Sync, then click Anywhere from the left panel.

Managing Backup & Sync

- 83 -

Page 91: SecureAnywhere for PCs User Guide

Changing sync settingsWebroot already configured synchronization with our recommended settings, but you can adjust the settings ifyou want. For example, you can adjust the size limit of files to upload or allow a synchronization to run whileyour computer is on battery power.

To change sync settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Backup & Sync tab, and make sure Backup & Sync is selected at the left.

3. Under Synchronization, click the Change Settings link.

Managing Backup & Sync

- 85 -

Page 92: SecureAnywhere for PCs User Guide

4. In the Backup & Sync Settings panel, make sure Sync Settings is selected on the left.

5. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (checkthe box). When you're done, click Save All.

Note: We recommend that you keep Webroot's default settings. If you make changes and decide youwant to return to the recommended settings, click the Reset to Defaults button.

The following table describes the settings.

Sync settings

Ignore hidden files anddirectories

When selected, files and directories that Windows has hidden inExplorer are not included in the sync. "Hidden" files are typically systemfiles that do not need to be synchronized. They can also consume a lot ofstorage space.

Ignore system filesand directories

When selected, Windows system files and directories are not included inthe sync. Typically, system files do not need to be synchronized. Theycan also consume a lot of storage space.

User Guide for PCs

- 86 -

Page 93: SecureAnywhere for PCs User Guide

Sync settings

Show WindowsExplorer overlay icons

When selected, the icons next to files and folders appear in WindowsExplorer to show if they are synchronized, are in the process ofsynchronizing, or did not get synchronized. For more information aboutthese icons, see "Synchronizing files" on page 81.

Do not synchronizefiles while running onbattery power

When selected, SecureAnywhere does not run a synchronization whenyour computer is unplugged and running on the battery.

Do not synchronizefiles when a full-screen application orgame is running

When selected, SecureAnywhere does not run a synchronization whenyou are watching a movie in full-screen mode or running a gamingapplication.

Warn when quotausage exceeds:

The number in the field determines when SecureAnywhere displays awarning when your storage limit is exceeded. You can adjust thepercentage by entering a new number.

Do not upload fileslarger than:

The number in the field determines the size of files to include insynchronization. If the file size exceeds the displayed limit, it will not beuploaded. You can adjust the size limit by entering a new number (inmegabytes).

Managing Backup & Sync

- 87 -

Page 94: SecureAnywhere for PCs User Guide

Adding sync foldersWebroot already configured one synchronization folder called the Anywhere folder (see "Synchronizing files"on page 81). However, you can designate more folders for synchronization if you like.

To add sync folders:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Backup & Sync tab, and make sure Backup & Sync is selected at the left.

3. Under Synchronization, click the Change Settings link.

4. Click Synchronized Folders on the left.

User Guide for PCs

- 88 -

Page 95: SecureAnywhere for PCs User Guide

5. Click Add Custom Folder.

6. In the next panel, click the Browse button to open the folder you want synchronized. If desired, you canspecify a different name for this folder that will display in SecureAnywhere. When you're done, clickAdd.

Managing Backup & Sync

- 89 -

Page 96: SecureAnywhere for PCs User Guide

Note: If you want to share a folder across multiple computers, see "Synchronizing folders with othercomputers" on page 92.

7. When the new directory appears in the Synchronized Folders panel, you can click Open Folder to seethe files and folders. (In Explorer, icons appear next to files and folders toshow if they have beensynchronized, are in the process of synchronizing, or did not get synchronized. For more informationabout these icons, see "Synchronizing files" on page 81.)

User Guide for PCs

- 90 -

Page 97: SecureAnywhere for PCs User Guide

8. If you want to check that your files successfully uploaded to your account, clickWeb Console. Whenyour browser opens to my.webrootanywhere.com, log in to your account, click Go to Backup & Sync,then click on the folder name from the left panel. For more information, see the SecureAnywhereManagement Website User Guide.

Managing Backup & Sync

- 91 -

Page 98: SecureAnywhere for PCs User Guide

Synchronizing folders with other computersIf you installed SecureAnywhere on multiple computers, you can create shared, synchronized folders betweenthem. Whenever you update data in one of these shared folders (adding, editing, moving, or deleting files),SecureAnywhere automatically makes the same changes in your online account and to all shared folders. Thisautomatic synchronization can be beneficial when you frequently use multiple computers and need access tothe most recent files.

Note: Be aware that when you make changes to a folder on one computer, the changes are propagatedacross the shared folders on all computers. For example, if you delete a shared folder, it is removedfrom all the computers. However, you can still access a deleted folder or file from the Recycle Bin inyour SecureAnywhere account. (See the SecureAnywhere Management Website User Guide.)

To create shared folders with other computers:

1. Configure a sync folder on the first computer. See "Adding sync folders" on page 88.

2. On the second computer, open the Backup & Sync Settings panel. To do this, click the Backup & Synctab, make sure Backup & Sync is selected at the left, then click the Change Settings link.

3. Click Synchronized Folders on the left.

User Guide for PCs

- 92 -

Page 99: SecureAnywhere for PCs User Guide

4. Click Add Custom Folder.

5. In the next panel, click Browse to open the folder you want to synchronize. Then select the radio buttonfor Link directory to an existing folder in the cloud. In the table, select the folder from the othercomputer, and click Add.

SecureAnywhere synchronizes all files in that folder with your other computer. In the Backup & Sync

Managing Backup & Sync

- 93 -

Page 100: SecureAnywhere for PCs User Guide

Settings panel, the Shared Across column shows the computers sharing that folder.

User Guide for PCs

- 94 -

Page 101: SecureAnywhere for PCs User Guide

Removing a folder from synchronizationYou can stop synchronizing the contents in a folder by detaching it from the automatic synchronization process.

Note: Detaching the folder does not delete it from your computer.

To remove a folder from synchronization:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Backup & Sync tab, and make sure Backup & Sync is selected at the left.

3. Under Synchronization, click the Change Settings link.

4. Click Synchronized Folders on the left.

5. Select the folder in the table and click Detach.

Managing Backup & Sync

- 95 -

Page 102: SecureAnywhere for PCs User Guide

The folder will no longer appear in the panel and will no longer synchronize to your SecureAnywhereaccount.

6. Click Close when you're done.

User Guide for PCs

- 96 -

Page 103: SecureAnywhere for PCs User Guide

Backing up filesInstead of synchronizing files, you can archive them instead. For example, you may want to back up taxreturns, old photos, and a scanned copy of your passport. These types of documents won't change and don'tneed to be kept in synchronization with other computers. Your backed-up files are uploaded to the Webrootservers, which are accessible from your SecureAnywhere account.

To configure backup:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Backup & Sync tab, and make sure Backup & Sync is selected at the left. (If you have notyet configured backup settings, the panel looks like the example below. If you did already configurebackups, skip to Step 5.)

3. Click Setup Backup.

4. In the next panel, select the types of documents you want included in the backup and click Continue. Acheckmark next to an item means every file with that extension will be copied to your online account. Ifyou want to designate different file types, click the Custom filter checkbox at the bottom.

Managing Backup & Sync

- 97 -

Page 104: SecureAnywhere for PCs User Guide

Note: If you decide later that you want to change file types, see "Changing backup filters" on page 104.

User Guide for PCs

- 98 -

Page 105: SecureAnywhere for PCs User Guide

5. When the Backup & Sync panel opens again, click Run Backup Now.

Note: Backups can also run automatically on a schedule. See "Changing the backup schedule" on page107.

Managing Backup & Sync

- 99 -

Page 106: SecureAnywhere for PCs User Guide

6. If you want to check your uploaded files, access your online account by clickingWeb Console.

7. When your browser opens to my.webrootanywhere.com, log in to your account, click Go to Backup &Sync, then click Backup from the left panel.

User Guide for PCs

- 100 -

Page 107: SecureAnywhere for PCs User Guide

Changing backup settingsWebroot already configured backups with our recommended settings, but you can adjust the settings if youwant. For example, you can adjust the size limit of files to upload or allow a synchronization to run while yourcomputer is on battery power.

Note: To change the types of files backed up, see "Changing backup filters" on page 104. To change thebackup schedule, see "Changing the backup schedule" on page 107.

To change backup settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Backup & Sync tab, and make sure Backup & Sync is selected at the left.

3. Under Backup, click the Change Settings link.

Managing Backup & Sync

- 101 -

Page 108: SecureAnywhere for PCs User Guide

4. Click Backup Settings on the left.

5. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (checkthe box). When you're done, click Save All.

Note: We recommend that you keep Webroot's default settings. If you make changes and decide youwant to return to the recommended settings, click the Reset to Defaults button.

The following table describes the settings.

Backup settings

Ignore hidden files anddirectories

When selected, files and directories that Windows has hidden inExplorer are not included in the backup. "Hidden" files are typicallysystem files that do not need to be backed up. They can also consume alot of storage space.

Ignore system filesand directories

When selected, Windows system files and directories are not included inthe backup. Typically, system files do not need to be backed up. Theycan also consume a lot of storage space.

User Guide for PCs

- 102 -

Page 109: SecureAnywhere for PCs User Guide

Backup settings

Show WindowsExplorer overlay icons

When selected, the icons next to files and folders appear in WindowsExplorer to show if they are backed up, are in the process of backing up,or did not get backed up. For more information about these icons, see"Synchronizing files" on page 81.

Do not archive whilerunning on batterypower

When selected, SecureAnywhere does not run a backup when yourcomputer is unplugged and running on the battery.

Do not archive when afull-screen applicationor game is running

When selected, SecureAnywhere does not run a backup when you arewatching a movie in full-screen mode or running a gaming application.

Do not upload fileslarger than:

The number in the field determines the size of files to include in thebackup. If the file size exceeds the displayed limit, it will not beuploaded. You can adjust the size limit by entering a new number (inmegabytes).

Managing Backup & Sync

- 103 -

Page 110: SecureAnywhere for PCs User Guide

Changing backup filtersUsing backup filters, you can include or exclude certain file types or subfolders for the backup.

To add or change the backup filters:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Backup & Sync tab, then make sure Backup & Sync is selected at the left.

3. Under Backup, click the Change Settings link.

4. Click Backup Filters at the left.

5. To add a new filter, click Add Filter. To edit an existing filter, select the filter in the table and clickEdit Filter.

User Guide for PCs

- 104 -

Page 111: SecureAnywhere for PCs User Guide

6. In the next dialog, select the criteria for the filter.

Filter settings are described in the following table.

Managing Backup & Sync

- 105 -

Page 112: SecureAnywhere for PCs User Guide

Filter settings

Directory Use the Browse button to select the local folder of the files.

Filter Name Enter a name that will describe this filter.

File type expressions Enter the extensions of the file types you want to include in this filter.

Back up files fromsubdirectories

Keep this checkbox selected if you want the subfolders included in thebackup.

Exclude files frombackup that match thisfilter

Select this checkbox if you want to create a filter that excludes files withthe specified extensions.

User Guide for PCs

- 106 -

Page 113: SecureAnywhere for PCs User Guide

Changing the backup scheduleYou can change the automatic backup schedule or turn off automatic backups.

To configure the backup schedule:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Backup & Sync tab, then make sure Backup & Sync is selected at the left.

3. Under Backup, click Change Settings.

Managing Backup & Sync

- 107 -

Page 114: SecureAnywhere for PCs User Guide

4. Select Backup Schedule from the left.

5. If you want to turn off automatic backups, de-select the checkbox next to Enable scheduled archiving.Otherwise, keep it selected.

6. If desired, click the Back up only on the following days checkbox and select a day of the week to runthe backups.

7. Select the time of day to run the backup or an hourly interval.

8. At the bottom of the panel, you have two additional options:

l Run immediately if Backup was inactive at the scheduled time. Keep this checkboxselected if you want to run a backup immediately after a missed schedule. A backup mightbe skipped if you disabled backups, if you shut down SecureAnywhere, or if your loggedoff your computer.

l Randomize the time of a scheduled archive up to one hour. Keep this checkboxselected if you want a scheduled backup to run within an hour of the scheduled time. Thisselection makes better use of network resources.

User Guide for PCs

- 108 -

Page 115: SecureAnywhere for PCs User Guide

Checking file statusYou can check the status of synchronization and backup from the main interface or from your account on theSecureAnywhere website.

To check file transfer status from the main interface:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Backup & Sync tab, then click File Transfers at the left.

To check your file status from the SecureAnywhere website:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the Backup & Sync tab, then make sure Backup & Sync is selected on the left.The amount of disk space used is displayed under the Status bar.

Managing Backup & Sync

- 109 -

Page 116: SecureAnywhere for PCs User Guide

3. To view your online account, clickWeb Console.

4. When your browser opens to my.webrootanywhere.com, log in to your account, click Go to Backup &Sync, then click the folders from the left panel.

User Guide for PCs

- 110 -

Page 118: SecureAnywhere for PCs User Guide

- 112 -

Page 119: SecureAnywhere for PCs User Guide

- 113 -

Using the System Cleaner

If you purchased a SecureAnywhere edition that includes the System Cleaner, you can remove all traces ofyour web browsing history, files that show your computer use, and other files that reveal your activity. Byremoving these items, you can protect your privacy. No one else who has access to your computer can seewhat websites you have visited or what search terms you have used.The System Cleaner also removesunnecessary files that consume valuable disk space, such as files in the Recycle Bin or Windows temporaryfiles.

To use the System Cleaner, see the following topics:

Running a system cleanup 114Running a scheduled cleanup 117Changing Windows Desktop settings 120Changing Windows system settings 123Changing Application settings 126Changing Internet Explorer settings 128Using Secure File Removal 132Viewing the cleanup log 135

Page 120: SecureAnywhere for PCs User Guide

Running a system cleanupIf you purchased a SecureAnywhere edition that includes the System Cleaner, you can remove all traces ofyour web browsing history, files that show your computer use, and other files that reveal your activity. As youwork on your computer and browse the Internet, you leave behind traces. These traces may be in the form oftemporary files placed on your hard drive, lists of recently used files in programs, lists of recently visitedwebsites, or cookies that websites placed on your hard drive. Anyone who has access to your computer canview what you have done and where you have been. Using the System Cleaner, you can protect your privacy byremoving all traces of your activity, including the Internet history, address bar history, Internet temporary files(cache), and cookie files.

You can also use the System Cleaner to delete unnecessary files that Windows stores on your computer.Certain files can consume valuable space on your computer. Even with today’s large hard drives, theseunnecessary files can impair your computer’s performance.

Note: Cleanups remove unnecessary files and traces, not malware threats. Malware (spyware andviruses) are removed during scans (see "Running scans " on page 18). You can think of the SystemCleaner as the housekeeper for your computer, while the Scanner serves as the security guard.

The System Cleaner does not run automatically; you need to run it yourself. Before the first cleanup, select allthe items you want removed.

To check cleanup settings and run a cleanup:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab. Make sure System Cleaner is selected on the left.

User Guide for PCs

- 114 -

Page 121: SecureAnywhere for PCs User Guide

3. Click Cleanup Settings.

4. In the System Cleaner panel, click each of the categories on the left side of the panel. On the right side,click in the checkboxes to select or deselect items to clean up. Items with a checkmark will be cleaned.

For more information about the settings, see:

• "Changing Windows Desktop settings" on page 120• "Changing Windows system settings" on page 123• "Changing Application settings" on page 126• "Changing Internet Explorer settings" on page 128

Using the System Cleaner

- 115 -

Page 122: SecureAnywhere for PCs User Guide

5. In the System Cleaner Settings panel, select Secure File Removal. By default, file removal is set to“Normal,” which means items are deleted permanently (bypassing the Recycle Bin). However, datarecovery utilities may be able to restore the files. If you want to make sure files can never be recovered,move the slider to Medium or Maximum. For more information, see "Using Secure File Removal" onpage 132.

6. When you’re done, click Save All, then click Close.

7. From the System Cleaner panel, click the Clean Up Now button.The progress panel shows items as they are removed, along with the space recovered.

User Guide for PCs

- 116 -

Page 123: SecureAnywhere for PCs User Guide

Running a scheduled cleanupYou can configure the System Cleaner to run automatically on a schedule.

To run a scheduled cleanup:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab. Make sure System Cleaner is selected on the left.

3. Click Cleanup Settings.

Using the System Cleaner

- 117 -

Page 124: SecureAnywhere for PCs User Guide

4. Make sure General Settings is selected on the left.

5. Click the Enable scheduled cleanup checkbox at the top of the panel.

6. If desired, click the Cleanup only on the following days checkbox and select a day of the week to runthe cleanups.

7. Select the time of day to run the cleanup or an hourly interval.

8. At the bottom of the panel, you have two additional options:

l Run on bootup if the system was off at the scheduled time. Keep this checkbox selectedif you want a missed scheduled cleanup to run when you turn on the computer again. De-select the checkbox if you want to skip missed cleanups.

l Enable Windows Explorer right click secure file erasing. Keep this checkbox selectedif you want to include an option for permanently erasing a file or folder in WindowsExplorer. This menu item appears when you right-click on a file or folder. De-select thecheckbox if you don't want the menu item to appear. The right-click menu looks similar tothe following example.

User Guide for PCs

- 118 -

Page 125: SecureAnywhere for PCs User Guide

9. When you’re done, click Save All, then click Close.

Using the System Cleaner

- 119 -

Page 126: SecureAnywhere for PCs User Guide

Changing Windows Desktop settingsThe System Cleaner can remove files in the Recycle Bin and the traces of what files you recently opened ortried to locate in a search. While these history traces can be helpful, they also reveal your activity to otherpeople using your computer. To maintain your privacy, you can remove all these traces.

To change Windows Desktop settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab. Make sure System Cleaner is selected on the left.

3. Click Cleanup Settings.

User Guide for PCs

- 120 -

Page 127: SecureAnywhere for PCs User Guide

4. From the left panel, clickWindows Desktop.

5. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (checkthe box). When you’re done, click Save All.

The following table describes the options:

Windows Desktop settings

Recycle Bin Removes all files from your Recycle Bin, which contains files you havedeleted using Windows Explorer. When you delete a file, it is stored inthe Recycle Bin until you empty it. You should periodically empty theRecycle Bin to preserve valuable disk space on your computer.

Recent documenthistory

Clears the history of recently opened files, which is accessible from theWindows Start menu. (The cleanup does not delete the actual files.)

Start Menu clickhistory

Clears the history of shortcuts to programs that you recently opened usingthe Start menu.

Using the System Cleaner

- 121 -

Page 128: SecureAnywhere for PCs User Guide

Windows Desktop settings

Run history Clears the history of commands that you recently entered into the Rundialog, which is accessible from the Start menu.Note: After the cleanup, you may need to restart your computer tocompletely remove items from the Run dialog.

Search history Clears the history of files or other information that you searched for onyour computer. Your computer stores recent searches and displays themwhen you start entering a new search that starts with the samecharacters. You access the search (also called "find") from WindowsExplorer or from your Start button. (The cleanup does not delete theactual files.)

Start Menu orderhistory

Reverts the list of programs and documents in the Start menu back toalphabetical order, which is the default setting. After you run thecleanup, you must reboot your system for the list to revert back toalphabetical order.

User Guide for PCs

- 122 -

Page 129: SecureAnywhere for PCs User Guide

Changing Windows system settingsThe System Cleaner can remove temporary files and traces left by the Windows operating system. These filesand traces can sometimes be a threat to your privacy. They can also consume a lot of disk space if you don’tdelete them once in awhile.

To change Windows system settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab. Make sure System Cleaner is selected on the left.

3. Click Cleanup Settings.

Using the System Cleaner

- 123 -

Page 130: SecureAnywhere for PCs User Guide

4. From the left panel, clickWindows System.

5. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (checkthe box). When you’re done, click Save All.

The following table describes the options:

Windows System settings

Clipboard contents Clears the contents from the Clipboard, where Windows stores datawhen you use either the Copy or Cut function from any Windowsprogram.

Windows Temporaryfolder

Deletes all files and folders in the Windows temporary folder, but notfiles that are in use by an open program. This folder is usually:C:\Windows\Temp. You should not put any files here that you need tokeep. The files in this folder can consume a lot of space on your harddrive.

User Guide for PCs

- 124 -

Page 131: SecureAnywhere for PCs User Guide

Windows System settings

System Temporaryfolder

Deletes all files and folders in the system temporary folder, but not filesthat are in use by an open program. This folder is usually in:C:\Documents and Settings\[username]\Local Settings\TempYou should not put any files here that you need to keep. The files in thisfolder can consume a lot of space on your hard drive.

Windows UpdateTemporary folder

Deletes all files and subfolders in this folder, but not files that are in useby an open program. Windows uses these files when you run WindowsUpdate. After you install the updates, you no longer need these files.These files are normally inC:\Windows\Software\Distribution\Download. You should not put anyfiles here that you need to keep. The files in this folder can consume a lotof space on your hard drive.

Windows RegistryStreams

Clears the history of recent changes you made to the Windows registry.(This option does not delete the registry changes themselves.)

Default logon userhistory

Deletes the Windows registry entry that stores the last name used to logon to your computer. When the registry entry is deleted, you must enteryour user name each time you turn on or restart your computer. Thiscleanup option does not affect computers that use the default Welcomescreen.

Memory dump files Deletes the memory dump file (memory.dmp) that Windows createswhen you receive certain Windows errors. The file contains informationabout what happened when the error occurred.

CD burning storagefolder

Deletes the Windows project files, created when you use the Windowsbuilt-in function to copy files to a CD. These project files are typicallystored in one of the following directories:C:\Documents and Settings\[username]\Local Settings\ApplicationData\Microsoft\CDBurningC:\Users\[username]\AppData\Local\Microsoft\Windows\Burn\Burn

Flash Cookies Deletes bits of data created by Adobe Flash, which can be a privacyconcern because they track user preferences. (Flash cookies are notactually “cookies,” and are not controlled through the cookie privacycontrols in a browser.)

Using the System Cleaner

- 125 -

Page 132: SecureAnywhere for PCs User Guide

Changing Application settingsThe System Cleaner can remove the traces left behind by applications, such as a list of recently opened files.While these history traces can be helpful, they also reveal your activity to other people using your computer. Tomaintain your privacy, you can remove all these traces. (The cleanup does not delete the files, just the placeswhere Windows tracks your activity.)

To change Application settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab. Make sure System Cleaner is selected on the left.

3. Click Applications.

Applications currently installed on your computer appear in this panel.

User Guide for PCs

- 126 -

Page 133: SecureAnywhere for PCs User Guide

4. On the right side, click in the checkboxes to select or deselect applications you want cleaned. TheSystem Cleaner will remove file history traces for the selected applications.

5. When you're done, click Save All, then click Close.

Using the System Cleaner

- 127 -

Page 134: SecureAnywhere for PCs User Guide

Changing Internet Explorer settingsThe System Cleaner can remove temporary files and traces left by the Windows operating system. While thesehistory traces can be helpful, they also reveal your activity to other people and can consume lots of disk space.To maintain your privacy and system performance, you can remove all these files and traces.

To change Application settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab. Make sure System Cleaner is selected on the left.

3. Click Cleanup Settings.

User Guide for PCs

- 128 -

Page 135: SecureAnywhere for PCs User Guide

4. From the left panel, click Internet Explorer.

5. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (checkthe box). When you’re done, click Save All.

Using the System Cleaner

- 129 -

Page 136: SecureAnywhere for PCs User Guide

The following table describes the options:

Internet Explorer settings

Address bar history Removes the list of recently visited websites, which is stored as part ofInternet Explorer’s AutoComplete feature. You see this list when youclick the arrow on the right side of the Address drop-down list at the topof the Internet Explorer browser.

Cookies Deletes all cookies from your computer. Cookies are small files thatstore information about your interaction with a website and may revealwhat sites you visited. Be aware that if you remove all cookie files, somewebsites will not “remember” you. This means that you may need to re-enter passwords, shopping cart items, and other entries that these cookiesstored.

Temporary InternetFiles

Deletes copies of stored web pages that you visited recently. This cacheimproves performance by helping web pages open faster the next timeyou visit them, but also reveals your visited sites to other people usingyour computer and can consume a lot of space on your hard drive.

URL history Deletes the list of recently visited websites. You see this list when youclick History on the Internet Explorer toolbar. While this history can behelpful, it also reveals your visited sites to other people using yourcomputer.

Setup Log Deletes log files created when you update Internet Explorer. After youinstall the updates, you no longer need these files.

Microsoft DownloadFolder

Deletes the contents in the folder that stores files you last downloadedusing Internet Explorer. After downloading, you no longer need thesefiles.

MediaPlayer BarHistory

Removes the list of audio and video files recently opened with the mediaplayer in Internet Explorer, which plays audio and video files that youaccess on websites. (The cleanup does not delete the files, just theWindows "memory" that you opened them or searched for them.)

User Guide for PCs

- 130 -

Page 137: SecureAnywhere for PCs User Guide

Internet Explorer settings

Autocomplete forminformation

Deletes data that Internet Explorer stores when you enter informationinto fields on websites. This is part of Internet Explorer’s AutoCompletefeature, which predicts a word or phrase based on the characters youbegin to type (for example, your email address or password).

Clean index.dat(cleaned on reboot)

Marks files in the index.dat file for deletion, then clears those files afteryou reboot the system. The index.dat file is a growing Windowsrepository of web addresses, search queries, and recently opened files.This option works when you also select one or more of the followingoptions: Cookies, Temporary Internet Files, or URL History. Note:Index.dat functions like an active database. It is only cleaned after youreboot Windows.

Using the System Cleaner

- 131 -

Page 138: SecureAnywhere for PCs User Guide

Using Secure File RemovalThe System Cleaner can permanently remove files in a “shredding” process, which overwrites them withrandom characters. This shredding feature is a convenient way to make sure no one can ever access your fileswith a recovery tool. (Although you may think that you are permanently deleting files when you empty theRecycle Bin or when you use Shift-Delete, in actuality, you are only removing the operating system’s record ofthe file, not the physical file itself.)

You can run a Secure File Removal from the main interface or from the Windows Explorer right-click menu.

To use Secure File Removal from the main interface:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab. Make sure System Cleaner is selected on the left.

3. Click Secure File Removal.The Secure File Removal panel opens. By default, file removal is set to “Normal,” which means items

User Guide for PCs

- 132 -

Page 139: SecureAnywhere for PCs User Guide

are deleted permanently (bypassing the Recycle Bin). However, data recovery utilities may be able torestore the files.

If you want to make sure files can never be recovered, move the slider to Medium or Maximum.“Medium” overwrites files with three passes, whereas “Maximum” overwrites files with seven passesand cleans the space around the files. Also be aware that cleanup operations take longer when you movethe slider to Medium or Maximum.

4. When you're done, click Save All.

5. You can now run a cleanup with the new setting. See "Running a system cleanup" on page 114.

Using the System Cleaner

- 133 -

Page 140: SecureAnywhere for PCs User Guide

To use Secure File Removal from the Windows Explorer menu:

1. Open Windows Explorer.

2. Right-click on the file or folder you want to permanently erase.

3. Select Permanently erase with Webroot.

SecureAnywhere will use the selected configuration option (Normal, Medium, or Maximum).

Note: If this menu option does not appear in the right-click menu, go to the General Settings panel andclick Enable Windows Explorer right click secure file erasing. See "Running a system cleanup" onpage 114.

User Guide for PCs

- 134 -

Page 141: SecureAnywhere for PCs User Guide

Viewing the cleanup logYou can view a log of what the System Cleaner removed.

To view the cleanup log:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab. Make sure System Cleaner is selected on the left.

The log opens in Notepad and shows a list of files and traces removed.

Using the System Cleaner

- 135 -

Page 142: SecureAnywhere for PCs User Guide

- 136 -

Page 143: SecureAnywhere for PCs User Guide

- 137 -

Using Advanced Tools

To learn more about advanced tools, see the following topics:

Controlling active processes 138Using the SafeStart sandbox 140Saving a scan log 142Using the System Analyzer 143Viewing the execution history 145Viewing the protection statistics 146

Page 144: SecureAnywhere for PCs User Guide

Controlling active processesUsing Active Processes, you can adjust the threat-detection settings for all programs and processes running onyour computer. It also includes a function for terminating any untrusted processes, which might be necessary ifa regular scan did not remove all traces of a malware program.

To adjust settings for active processes:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab.

3. Click System Control on the left.

User Guide for PCs

- 138 -

Page 145: SecureAnywhere for PCs User Guide

4. Click the Start button under Control Active Processes.

5. For each process, you can select the radio button for:l Allow: The process is allowed to run on your system.

l Monitor: Webroot SecureAnywhere will watch the process and open an alert on suspiciousactivity.

l Block: The process is blocked from running on your system. Do NOT block a process unless youare absolutely certain it is non-essential.

If you want to terminate all untrusted processes, click Kill Untrusted Processes.

Using Advanced Tools

- 139 -

Page 146: SecureAnywhere for PCs User Guide

Using the SafeStart sandboxIf you are an advanced user and want to test a program you believe is malware, you can first execute theprogram in a protected area called the SafeStart Sandbox. This sandbox allows you to isolate the actions of themalware program and observe its behavior.

Note: The SafeStart Sandbox is intended for testing malware, not legitimate programs.

To execute a file in the SafeStart sandbox:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab.

3. Click System Control on the left.

User Guide for PCs

- 140 -

Page 147: SecureAnywhere for PCs User Guide

4. Click the Start button under SafeStart Sandbox.

5. You can select the file either by clicking the Browse button or by entering the filename and location inthe Command-line field.

6. If you want to use some advanced features for controlling how the program is allowed to execute, selecta checkbox to disable a function (uncheck the box) or activate it (check the box).

7. When you’re done, click the Start button.

Using Advanced Tools

- 141 -

Page 148: SecureAnywhere for PCs User Guide

Saving a scan logIf you want to investigate what SecureAnywhere scanned and what it found, you can save a scan log. This logmight be helpful if you are working with Webroot Support to determine the cause of a problem.

To save a scan log:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab.

3. Click Reports on the left.

4. Under Scan Log, click the Save as button.

5. Enter a filename and click Save.

User Guide for PCs

- 142 -

Page 149: SecureAnywhere for PCs User Guide

Using the System AnalyzerIf you purchased a SecureAnywhere edition that includes System Analyzer, you can use this simple utility toquickly scan for threats, security vulnerabilities, and other computer problems. After the scan, it displays areport that describes any vulnerabilities it found. It also provides recommendations about enhancements thatcan increase system performance, privacy, and protection.

To run System Analyzer:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab.

3. Click System Analyzer on the left.

4. Click Start.

System Analyzer scans your system, then displays a report summary similar to the following example.

Using Advanced Tools

- 143 -

Page 150: SecureAnywhere for PCs User Guide

5. You can view more detailed information by clicking the View advanced detail link at the bottom right.

6. To save the report to your Desktop, click Save. Otherwise, click Close to exit from the report.

User Guide for PCs

- 144 -

Page 151: SecureAnywhere for PCs User Guide

Viewing the execution historyThe Execution History is mainly used by Technical Support to see when and where a virus entered the system.

To view the execution history:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab.

3. Click Reports on the left.

4. Under Execution History (Advanced), click the View button.

5. Enter a filename and click Save.

Using Advanced Tools

- 145 -

Page 152: SecureAnywhere for PCs User Guide

Viewing the protection statisticsProtection Statistics are mainly used by Webroot Support to view the background processes that WebrootSecureAnywhere is monitoring.

To view protection statistics:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab.

3. Click Reports on the left.

User Guide for PCs

- 146 -

Page 153: SecureAnywhere for PCs User Guide

4. Under Protection Statistics, click the View button.

5. Click on an event in the left column to view more detailed information.

6. When you're done, click Close.

Using Advanced Tools

- 147 -

Page 154: SecureAnywhere for PCs User Guide

- 148 -

Page 155: SecureAnywhere for PCs User Guide

- 149 -

Managing Your Account

Your Webroot account includes information about your software licenses and other details. Your accountinformation is available from the My Account panel of the SecureAnywhere program or frommy.webrootanywhere.com, which is the online interface.

To learn more about your SecureAnywhere account, see the following topics:

Viewing your account details 150Activating a new keycode 151Renewing your subscription 152Checking for updates 153

Page 156: SecureAnywhere for PCs User Guide

Viewing your account detailsYou can view your keycode and the time remaining on your subscription from the My Account window.

To view account details:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the My Account tab.Your account information appears in the panel.

User Guide for PCs

- 150 -

Page 157: SecureAnywhere for PCs User Guide

Activating a new keycodeIf you receive a new keycode from Webroot, you can activate it in the My Account panel.

To activate a new keycode:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the My Account tab.

3. Click Activate a new keycode.

4. In the dialog, enter the keycode and click the Activate button.

Managing Your Account

- 151 -

Page 158: SecureAnywhere for PCs User Guide

Renewing your subscriptionYou can renew your subscription from the My Account window.

To renew your subscription:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the My Account tab.

3. Click Learn more about available upgrades.

The Webroot website opens. From here, you can purchase an upgrade to your software.

User Guide for PCs

- 152 -

Page 159: SecureAnywhere for PCs User Guide

Checking for updatesIf you deactivated automatic updates from General Preferences, you can manually check for updates yourself.

Note: For more information about setting automatic updates, see "Setting general preferences" on page156.

To check for SecureAnywhere updates:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the My Account tab.

3. Click Check for software updates.If a newer version exists, Webroot downloads the updates to your system.

Managing Your Account

- 153 -

Page 160: SecureAnywhere for PCs User Guide

- 154 -

Page 161: SecureAnywhere for PCs User Guide

- 155 -

Setting Preferences

To learn more about setting preferences, see the following topics:

Setting general preferences 156Setting basic configuration 162Setting access control 166Defining proxy server settings 169Adjusting heuristics 172Exporting and importing settings 177Setting self protection 180

Page 162: SecureAnywhere for PCs User Guide

Setting general preferencesYou can change the behavior of the program in General Preferences.

To change general preferences:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In the upper right corner, click Settings.

The Settings panel opens.

User Guide for PCs

- 156 -

Page 163: SecureAnywhere for PCs User Guide

3. Select the slide bars to adjust the settings, which are described in the following tables. When you’redone, click the Save All button.

Note: We recommend that you keep Webroot’s default settings. If you make changes and decide youwant to return to the recommended settings, click the Reset to Defaults button.

Setting Preferences

- 157 -

Page 164: SecureAnywhere for PCs User Guide

The following tables describe the slider options.

Set and forget protection — Hands-on security (more prompts)

This slider affects the following advanced settings:

l Show the “Authenticating Files” pop-up when a new file is scanned on-execution.See "Changing the scan settings" on page 25.

l Fade out warning messages automatically.See "Setting basic configuration" on page 162.

l Warn before blocking untrusted programs from accessing protected data.See "Changing Identity Protection settings" on page 63.

Slider in left-most position: Disabled: Show the “Authenticating Files” pop-up when a new fileis scanned on-execution.Enabled: Fade out warning messages automatically.Disabled: Warn before blocking untrusted programs from accessingprotected data.

Slider inmiddle position: Enabled: Show the “Authenticating Files” pop-up when a new fileis scanned on-execution.Enabled: Fade out warning messages automatically,Disabled: Warn before blocking untrusted programs from accessingprotected data.

Slider in right-mostposition:

Enabled: Show the “Authenticating Files” pop-up when a new fileis scanned on-execution.Disabled: Fade out warning messages automatically.Enabled: Warn before blocking untrusted programs from accessingprotected data.

User Guide for PCs

- 158 -

Page 165: SecureAnywhere for PCs User Guide

Minimal system resource usage — Fastest scanning

This slider affects the following advanced settings:

l Favor low disk usage over verbose logging (fewer details stored in logs).See "Setting basic configuration" on page 162.

l Favor low CPU usage over fast scanning.See "Changing the scan settings" on page 25.

l Operate background functions using fewer CPU resources.See "Setting basic configuration" on page 162.

l Lower resource usage when intensive applications or games are detected.See "Setting basic configuration" on page 162.

l Favor low memory usage over fast scanning.See "Changing the scan settings" on page 25

Slider in left-mostposition:

Enabled: Favor low disk usage over verbose logging (fewer detailsstored in logs).Enabled: Favor low CPU usage over fast scanning.Enabled: Operate background functions using fewer CPU resources.Enabled: Lower resource usage when intensive applications or gamesare detected.Enabled: Favor low memory usage over fast scanning.

Slider inmiddle position: Disabled: Favor low disk usage over verbose logging (fewer detailsstored in logs).Disabled: Favor low CPU usage over fast scanning.Enabled: Operate background functions using fewer CPU resources.Enabled: Lower resource usage when intensive applications or gamesare detected.Enabled: Favor low memory usage over fast scanning.

Slider in right-mostposition:

Disabled: Favor low disk usage over verbose logging (fewer detailsstored in logs).Disabled: Favor low CPU usage over fast scanning.Disabled: Operate background functions using fewer CPU resources.Enabled: Lower resource usage when intensive applications or gamesare detected.Disabled: Favor low memory usage over fast scanning.

Setting Preferences

- 159 -

Page 166: SecureAnywhere for PCs User Guide

Less automatic scanning — Daily thorough system scanning

This slider affects the scan schedule settings. See "Changing the scan schedule" on page 22.Note: A "quick" scan searches the system's memory. A "deep" scan searches for all types ofmalware in all locations.

Slider in left-most position: Runs a quick scan when the computer starts (boot-up).

Slider inmiddle position: Runs a quick scan every day.

Slider in right-mostposition:

Runs a deep scan every day.

Basic internal security — Maximum internal security

This slider affects the following advanced settings:

l Self protection: minimum, medium, or maximum.See "Setting self protection" on page 180.

l Require the completion of a CAPTCHA when changing critical features.See "Setting access control" on page 166.

l Self protection response cloaking.See "Setting self protection" on page 180.

Slider in left-most position: Minimum: Self protection.Disabled: Require the completion of a CAPTCHA when changingcritical features.Disabled: Self protection response cloaking.

Slider inmiddle position: Medium: Self protection.Enabled: Require the completion of a CAPTCHA when changingcritical features.Disabled: Self protection response cloaking.

Slider in right-mostposition:

Maximum: Self protection.Enabled: Require the completion of a CAPTCHA when changingcritical features.Enabled: Self protection response cloaking.

User Guide for PCs

- 160 -

Page 167: SecureAnywhere for PCs User Guide

Strong behavior and cloud heuristics— Maximum heuristics (more warnings)

This slider affects the advanced heuristics settings. See "Adjusting heuristics" on page 172.

Slider in left-most position: Sets all heuristics to the Low setting (second position in theHeuristics panel slider).

Slider in left-middleposition:

Sets all heuristic settings to the SecureAnywhere defaults in theHeuristics panel.

Slider in right-middleposition:

Raises heuristic settings for important areas, while leaving lessvulnerable areas at the defaults.

Slider in right-mostposition:

Raises all heuristic settings to the maximum.

Setting Preferences

- 161 -

Page 168: SecureAnywhere for PCs User Guide

Setting basic configurationYou can change the behavior of the program in General Preferences.

To change general preferences:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In the upper right corner, click Settings.

User Guide for PCs

- 162 -

Page 169: SecureAnywhere for PCs User Guide

3. In the Settings panel, click Advanced Settings.

4. Make sure Basic Configuration is selected at the left.

5. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (checkthe box). When you’re done, click Save All.

Setting Preferences

- 163 -

Page 170: SecureAnywhere for PCs User Guide

Note: We recommend that you keep Webroot’s default settings. If you make changes and decide youwant to return to the recommended settings, click the Reset to Defaults button.

The following table describes the options.

Basic Configuration settings

Show aSecureAnywhereshortcut on the desktop

Provides quick, double-click access to the main interface by placing theshortcut icon on your desktop.

Show a system trayicon

Provides quick access to SecureAnywhere functions by placing theWebroot icon on your desktop. You can double-click the icon to open themain interface or right-click to open a menu of common functions, likescanning.

Show a splash screenon bootup

Opens the Webroot splash screen on system startup, which lets you knowthat the program is running and protecting your computer.

ShowSecureAnywhere inthe Start Menu

Lists Webroot SecureAnywhere in the Windows Startup menu items.

ShowSecureAnywhere inAdd/Remove Programs

Lists Webroot SecureAnywhere in the Windows Add/Remove Programspanel.

ShowSecureAnywhere inWindows SecurityCenter

Lists Webroot SecureAnywhere in the Windows Security Center, underVirus Protection information.

Hide theSecureAnywherelicense keycode on-screen

Blocks your license keycode from displaying on the My Account panel.

Automaticallydownload and applyupdates

Downloads product updates automatically without alerting you.

Operate backgroundfunctions using fewerCPU resources

Saves CPU resources by running non-scan related functions in thebackground.

User Guide for PCs

- 164 -

Page 171: SecureAnywhere for PCs User Guide

Basic Configuration settings

Favor low disk usageover verbose logging(fewer details stored inlogs)

Saves disk resources by saving only the last four log items.

Lower resource usagewhen intensiveapplications or gamesare detected

Suppresses SecureAnywhere functions while you are gaming, watchingvideos, or using other intensive applications.

AllowSecureAnywhere to beshut down manually

Displays a Shutdown command in the system tray menu. If you deselectthis option, the Shutdown command is removed from the menu.

Force non-criticalnotifications into thebackground

Suppresses information-only messages from appearing in the system tray.

Fade out warningmessagesautomatically

Closes warning dialogs in the system tray after a few seconds. If youdisable this option, you must manually click on a message to close it.

Store ExecutionHistory details

Stores data for the Execution History logs, available under Reports.

Setting Preferences

- 165 -

Page 172: SecureAnywhere for PCs User Guide

Setting access controlIf multiple people use your computer, you can set some permissions that provide or deny access to certainfunctions. These access controls also protect your computer from malware that tries to change settings inSecureAnywhere.

To change Access Control settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In the upper right corner, click Settings.

User Guide for PCs

- 166 -

Page 173: SecureAnywhere for PCs User Guide

3. In the Settings panel, click Advanced Settings.

4. Click Access Control at the left.

5. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (checkthe box). When you’re done, click Save All.

The following table describes the options.

Setting Preferences

- 167 -

Page 174: SecureAnywhere for PCs User Guide

Access Control settings

Enable PasswordProtection

Requires that users enter a password for any configuration changes orcritical actions.

Allow users to scanwithout a password

Allows any user to scan the system, even if password protection isenabled.

Allow users to removethreats without apassword

Allows any user to remove threats, even if password protection isenabled.

Require thecompletion of aCAPTCHA whenchanging criticalfeatures

Opens a CAPTCHA dialog that requires you to read distorted text on thescreen and enter the text in a field before performing any critical actions.These actions include changing shields, importing configuration settings,uninstalling the program, and shutting down the agent.

Require thecompletion of aCAPTCHA whenchanging configuration

Opens a CAPTCHA dialog that requires you to read distorted text on thescreen and enter the text in a field before performing any configurationchanges.

RememberCAPTCHAcompletion until thewindow is closed

Allows you to complete configuration changes and critical functionswithout re-entering a CAPTCHA test again. SecureAnywhere willremember your last CAPTCHA until you close the main interface.

Allow non-administrative users tomodify configurationoptions

Enables you to modify configuration options, whether you are logged inas an administrative user or not.

Allow uninstallationby non-administrativeusers

Enables you to access the Antimalware Tools (under Quarantine),whether you are logged in as an administrative user or not.

Allow access toantimalware tools bynon-administrativeusers

Enables you to access the advanced features, whether you are logged inas an administrative user or not. Advanced features include all options inthe Settings panels and the Antimalware tools under Quarantine.

Allow access toadvanced features bynon-administrativeusers

Enables you to access the advanced features, whether you are logged inas an administrative user or not. Advanced features include all options inthe Settings panels and the Antimalware tools under Quarantine.

Enable enhancedcustomer support

Provides configuration and debug data to Webroot Support when youinitiate a support request. This feature allows Support to quickly diagnoseand repair the issue.

User Guide for PCs

- 168 -

Page 175: SecureAnywhere for PCs User Guide

Defining proxy server settingsIf you use a proxy server to connect to the Internet, you must define the proxy connection data; otherwise,Webroot cannot send updates to your computer. (A proxy server is a computer system or router that acts as arelay between your computer and another server.) For further information about your proxy environment,contact your proxy server’s administrator.

To define proxy server settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In the upper right corner, click Settings.

Setting Preferences

- 169 -

Page 176: SecureAnywhere for PCs User Guide

3. In the Settings panel, click Advanced Settings.

4. Click Proxy at the left.

5. Enter the proxy settings, which are described in the following table. When you’re done, click Save All.

User Guide for PCs

- 170 -

Page 177: SecureAnywhere for PCs User Guide

Proxy settings

Proxy Type Select HTTP Proxy from the drop-down box.

Authentication Method Select an authentication method from the drop-down box.

Host Enter the fully qualified domain name of the server (for example,proxy.company.com).

Port Enter the port number the server uses.

Username Enter the user name of the server, if used.

Password Enter the password of the server, if used.

Setting Preferences

- 171 -

Page 178: SecureAnywhere for PCs User Guide

Adjusting heuristicsWith heuristics settings, you can adjust the level of threat analysis that Webroot SecureAnywhere performswhen scanning your computer. Heuristics can be adjusted for separate areas of your computer, including thelocal drive, USB drives, the Internet, the network, CD/DVDs, and when your computer is offline. Werecommend that you keep heuristics at their default settings, unless you are an advanced user and understandhow changing settings will impact threat detection.

Webroot SecureAnywhere includes three types of heuristics:

l Advanced Heuristics. Analyzes new programs for suspicious actions that are typical of malware.

l Age Heuristics. Analyzes new programs based on the amount of time the program has been in thecommunity. Legitimate programs are generally used in a community for a long time, but malware oftenhas a short life span.

l Popularity Heuristics. Analyzes new programs based on statistics for how often the program is used inthe community and how often it changes. Legitimate programs do not change quickly, but malware oftenmutates at a rapid pace. Malware may install as a unique copy on every computer, making it statistically“unpopular.”

To change heuristics settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

User Guide for PCs

- 172 -

Page 179: SecureAnywhere for PCs User Guide

2. In the upper right corner, click Settings.

Setting Preferences

- 173 -

Page 180: SecureAnywhere for PCs User Guide

3. In the Settings panel, click Advanced Settings.

4. Click Heuristics at the left.

5. Select the tab for the area you want to change heuristics settings: Local, USB, Internet, Network,CD/DVD, or Offline.

User Guide for PCs

- 174 -

Page 181: SecureAnywhere for PCs User Guide

6. Select the radio buttons and slide bars to adjust the settings, which are described in the following tables.When you’re done, click the Save All button.

The following table describes the options.

Radio buttons -- additional heuristics options

Disable Heuristics Turns off heuristic analysis. Not recommended.

Apply advancedheuristics beforeAge/Popularityheuristics

Warns against new programs as well as old programs that exhibitsuspicious behavior.

Apply advancedheuristics afterAge/Popularityheuristics

Warns against suspicious programs detected with Advanced Heuristics,based on Age/Popularity settings.

Warn when newprograms execute thatare not trusted

Warns when malicious, suspicious, or unknown programs try to execute.(This setting may result in false detections.)

Slider - advanced heuristics

Disabled Turns off Advanced Heuristics for the area selected in the tab, leaving itvulnerable to new threats. (However, it will still be protected againstknown threats.)

Low Detects programs with a high level of malicious activity. This settingignores some suspicious behavior and allows most programs to run.

Medium Balances detection versus false alarms by using our tuned heuristics inthe centralized community database.

High Protects against a wide range of new threats. Use this setting if you thinkyour system is infected or at very high risk. (This setting may result infalse detections.)

Maximum Provides the highest level of protection against new threats. Use thissetting if you think that your system is infected or at very high risk. (Thissetting may result in false detections.)

Setting Preferences

- 175 -

Page 182: SecureAnywhere for PCs User Guide

Slider - age heuristics

Disabled Turns off Age Heuristics for the area selected in the tab, leaving itvulnerable to new threats. (However, it will still be protected againstknown threats.)

Low Detects programs that have been created or modified very recently.

Medium Detects programs that are fairly new and not trusted, preventing zero-dayor zero-hour attacks. We recommend using this setting if you do notinstall unpopular programs and want an extra degree of security toprevent mutating threats.

High Detects programs that have been created or modified in a relatively shorttime and are not trusted. This setting is recommended only if you rarelyinstall new programs and if you feel that your system is relativelyconstant. This setting may generate a higher level of false alarms onmore obscure or unpopular programs.

Maximum Detects all untrusted programs that have been created or modified fairlyrecently. You should only use this setting if your computer is in a high-risk situation or if you think that it is currently infected.

Slider - popularity heuristics

Disabled Turns off Popularity Heuristics for the area selected in the tab, leaving itvulnerable to new threats. (However, it will still be protected againstknown threats.)

Low Detects programs that have been seen for the first time. This setting isrecommended if you frequently install new programs, beta programs, oryou are a software developer who frequently creates new programs.

Medium Detects unpopular and mutating programs, preventing zero-day and zero-hour attacks. This setting is recommended if you do not frequently installnew programs and want an extra level of protection over standardsettings.

High Detects programs that a significant percentage of the community hasseen. This setting is recommended if you do not install new programs andsuspect that your system is infected.

Maximum Detects programs that a large percentage of the community has seen.This setting is recommended if you think your system is at a very highrisk and are willing to accept that you may receive false alarms becauseof the strict heuristic rules.

User Guide for PCs

- 176 -

Page 183: SecureAnywhere for PCs User Guide

Exporting and importing settingsIf you changed the SecureAnywhere configuration, you can back up those new settings using the Exportfunciton. A backup of your configuration is helpful if you ever need to reinstall the software or transfer yourconfiguration to another computer.

To export and import settings:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In the upper right corner, click Settings.

Setting Preferences

- 177 -

Page 184: SecureAnywhere for PCs User Guide

3. In the Settings panel, click Advanced Settings.

4. Click Import/Export at the bottom left.

User Guide for PCs

- 178 -

Page 185: SecureAnywhere for PCs User Guide

5. To transfer your settings to another computer, click Export Settings. Enter a name for the file and clickSave.These settings can be from an external hard drive or USB drive. Depending on the file size, this maytake a few seconds.

6. Access the other computer and click Import Settings. Select the file and click Save.

Setting Preferences

- 179 -

Page 186: SecureAnywhere for PCs User Guide

Setting self protectionSelf Protection prevents malicious software from modifying the SecureAnywhere program settings andprocesses. If SecureAnywhere detects that another product is attempting to interfere with its functions, itlaunches a protective scan to look for threats. It will also update the internal self protection status to preventincompatibilities with other software.

We recommend that you keep Self Protection at the Maximum setting. However, if you use other securitysoftware along with SecureAnywhere, you should adjust Self Protection to the Medium or Minimum setting.The Maximum setting may interfere with other security software.

To change the Self Protection setting:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. In the upper right corner, click Settings.

User Guide for PCs

- 180 -

Page 187: SecureAnywhere for PCs User Guide

3. In the Settings panel, click Advanced Settings.

4. In the Settings panel, click Self Protection at the left.

5. Click a radio button forMinimum, Medium, orMaximum security.

Setting Preferences

- 181 -

Page 188: SecureAnywhere for PCs User Guide

Note: If you want to turn off self protection, uncheck the Enable self protection response cloakingbox.

6. Click Save All.

User Guide for PCs

- 182 -

Page 189: SecureAnywhere for PCs User Guide

- 183 -

Accessing Support and Resources

To learn more about Webroot's Support options and other resources, see the following topics:

Accessing Technical Support options 184Accessing additional publications 185Saving a threat log for analysis 186Submitting a file to Webroot for analysis 187

Page 190: SecureAnywhere for PCs User Guide

Accessing Technical Support optionsWebroot offers a variety of Technical Support options, including:

l Ticket and phone support.

l Interactive knowledgebase.

To access these support options, go to our online Support site: SecureAnywhere Product Support.

User Guide for PCs

- 184 -

Page 191: SecureAnywhere for PCs User Guide

Accessing additional publicationsWebroot provides the following additional resources:

l SecureAnywhere Website User Guide

l SecureAnywhere User Guide for Macs

l Help for Webroot Mobile Security

To access these resources, go to our Help and Product Guides page.

Accessing Support and Resources

- 185 -

Page 192: SecureAnywhere for PCs User Guide

Saving a threat log for analysisIf you want to investigate an infection with Webroot Support, you can save a threat log and send it to Webroot.The threat log shows details about threats removed from your computer.

To save a threat log:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the PC Security tab.

3. Click Quarantine on the left.

4. Click Save Threat Log.

5. In the dialog, select a folder location for the log and click Save.

User Guide for PCs

- 186 -

Page 193: SecureAnywhere for PCs User Guide

Submitting a file to Webroot for analysisIf a file on your system is causing problems or if you know a file is safe and want it reclassified, you can sendthe file to Webroot for analysis.

To submit a file:

1. Open SecureAnywhere (see "Using the SecureAnywhere interface" on page 12).

2. Click the System Tools tab.

3. Click Submit a File on the left. A dialog asks if you would rather go to the Support website, where youmight receive a quicker response.

4. Click No at the prompt if you still want to submit a file for analysis.

5. Select the file by clicking the Browse button.

6. Select any of the checkboxes that apply to this file.

7. Enter any additional information in the bottom field.

Accessing Support and Resources

- 187 -

Page 194: SecureAnywhere for PCs User Guide

8. Click Send.Webroot Support will contact you.

User Guide for PCs

- 188 -

Page 195: SecureAnywhere for PCs User Guide

- 189 -

Glossary

A

adwareSoftware designed to display advertisements on your system or hijack web searches (rerouting searchesthrough its own web page). It may also change your default home page to a specific website. Adwaregenerally propagates itself using dialog boxes and social engineering methods.

B

backupA backup transfers files in one direction, typically from your computer to another source. In contrast,synchronization transfers files in multiple directions: from your computer to another source or from the othersource back to your computer.

C

cookiesSmall strings of text designed to help websites remember your browser and preferences. Cookies cannot stealinformation off your machine, but some do store personal information that you may not want outside partiesto gather. You can manage cookie settings in your browser's security or privacy preferences.

H

hosts fileA file that helps direct your computer to a website using Internet Protocol (IP) addresses. When you enter aweb address in a browser, your computer first looks in the hosts file to see if the domain is already listed. Ifso, it goes directly to the IP address. Some types of malware can hijack the entries in the hosts file.

K

keycodeYour keycode is the 20-character license that identifies your Webroot account. If you purchased the productonline, the keycode is provided in an email from Webroot. If you purchased the product in a store, thekeycode is provided in the retail box. After installation, the My Account panel lists your keycode.

Page 196: SecureAnywhere for PCs User Guide

keyloggerA system monitor that records keyboard activity. Keyloggers can be used for legitimate purposes, but can alsorecord sensitive information for malicious purposes.

M

malwareMalicious software that is designed to destroy or harm your computer system. Malware includes viruses,spyware, adware, and all types of threats.

P

phishingA fraudulent method criminals use to steal personal information. These criminals design websites or emailmessages that appear to originate from trustworthy sources, such as eBay, PayPal, or even your own bank.Typical scams can trick you into entering your user names, passwords, and credit card information.

Q

quarantineWebroot's holding area for spyware, viruses, and other potentially unwanted applications. The quarantineprocess does not delete items from your computer. Rather, it renders them inoperable and stores them in a safeplace where they cannot cause any harm. You do not need to delete items in quarantine, unless you want topreserve storage space. You can also restore an item from quarantine, if necessary.

R

registryA database of hardware and software settings about your computer’s configuration, such as the types ofprograms that are installed. Spyware can create entries in the Windows registry, which can ultimately slowdown your computer and cause problems in your system.

rootkitA collection of tools that enable administrator-level access to a computer or network. By using file-obfuscation techniques, rootkits can hide logins, processes, files and logs, and may include software to captureinformation from desktops or a network. Spyware developers often use rootkits to avoid detection andremoval.

User Guide for PCs

- 190 -

Page 197: SecureAnywhere for PCs User Guide

S

scanWebroot's process of searching for potential threats on your computer, such as spyware and viruses. It thenmoves items to quarantine, where they are rendered inoperable.

shieldWebroot's method of guarding your system while you browse the Internet. If the shields detect spyware orother potential threats attempting to download, they respond in one of two ways. If the item is a threat, theshield moves it to quarantine. If the item is unknown or a potential threat, the shield opens an alert messagethat asks you to allow it or block it.

spywareA program that may either monitor your online activities or install programs without your knowledge.Spyware may get bundled with freeware, shareware, or email attachments. You can also accidentally installspyware by clicking on dialog boxes in websites. Once installed, spyware can send information about youronline activities to a third party for malicious purposes.

synchronizationSynchronization transfers files in multiple directions: from your computer to another source or from the othersource back to your computer. Changes on one computer will be copied to the online repository and to theother computers.

T

Trojan HorseA program that takes control of your computer files, allowing a hacker to install, execute, open, or closeprograms. A Trojan is usually disguised as a harmless software program. It may also be distributed as an emailattachment. When you open the program or attachment, the Tropjan can launch an auto-installation processthat downloads third-party programs onto your computer.

V

virusA self-replicating program that can infest computer code, documents, or applications. While some viruses arepurposefully malignant, others are more of a nuisance, replicating uncontrollably and inhibiting systemperformance.

Glossary

- 191 -

Page 198: SecureAnywhere for PCs User Guide

- 192 -

Page 199: SecureAnywhere for PCs User Guide

Index

A

access control settings 166account

changing keycode 151creating 8personal security code 10viewing details 150

active processes 138Add/Remove programs, removing

SecureAnywhere from 164advanced heuristics 172age heuristics 172alerts

disabling fade-out 165firewall alerts 49forcing in the background 165Identity Protection alerts 65shield alerts 30suppressing for unknown or unclassified

items 37supressing when same file is detected 34threat detection alerts 21

Android app 4antimalware tools 58AntiVirus edition 2Anywhere folder 81Apple app 4application file history, clearing 126applications, protection 66apps for SecureAnywhere 4archived files, removing from scans 27archiving files 78autocomplete form history, clearing 131

B

Backup & Syncadding sync folders 88backing up files 97changing backup filters 104changing backup schedule 107changing backup settings 101changing quota warning 87changing sync settings 85changing upload limits 87, 103checking file transfer status 109detaching folders from sync 95disabling for battery power or gaming 87,

103disabling sync icons 87, 103downloading component 79excluding files from backup 106excluding subdirectories 106icons in Explorer 81ignoring files 86, 102saving previous versions 78sharing folders across computers 92synchronizing files 81viewing files in Web Console 109

basic configuration settings 162Behavior shield 35BHOs, blocking 72browser add-ons, blocking 72browsers, supported 3browsing activity, hiding 71

C

CAPTCHA, disabling 168CD burning storage folder, clearing 125CD/DVD hueristics 174Checkmarks in web search results 45cleanup log 135

Page 200: SecureAnywhere for PCs User Guide

cleanup, running 114clipboard data

clearing 124protection 71

cloud heuristics 156Complete edition 2configuration settings 162control active processes 138cookies

blocking 71blocking third-party 65removing flash cookies 125removing IE cookies 130

copying files 81Core System shield 38CPU resources, preserving 164cross-scripting attacks, preventing 43

D

desktop icondisplaying after installation 164including in installation 5

detection configuration 56disk usage, lowering 165

E

editions of SecureAnywhere 2enhanced customer support setting 168Execution History

storing details 165viewing 145

export settings 177

F

firewallalerts 49disabling 48

managing network applications 50

G

gamer mode 24, 87

H

heuristics 172hosts file, preventing changes 40

I

Identity Protectionchanging settings 63disabling 62protecting applications 66protecting websites 69supported browsers 62

import settings 177index.dat file, clearing entries 131installation on a PC 2internal security 156Internet Explorer, clearing activity traces 128Internet files, deleting 130Internet heuristics 174Internet Security Plus edition 2iOS app 4iPhone app 4

K

kernal, prevent programs from modifying 40keycode

changing 151entering on registration 9hiding on screen 164locating 4

keyloggers, protection from 71knowledgebase 184

User Guide for PCs

- 194 -

Page 201: SecureAnywhere for PCs User Guide

L

language, changing 5license, renewing 152Local heuristics 174lock icon in system tray 66, 69login credentials, protection 65logon user history, clearing 125LSP chain, monitoring 40

M

Mac installation 3main interface 12malware testing in a sandbox 140man-in-the-browser attacks, protection from 72man-in-the-middle attacks, protection from 65,

71master boot record infections, protection

against 27media player bar history, clearing 130memory dump files, removing 125mobile apps 4

N

network applications, monitoring 50Network heuristics 174

O

Offline heuristics 174offline protection in Realtime shield 34Offline shield 30opening SecureAnywhere 12Overview panel 12

P

padlock icon in system tray 66, 69

passwordrequiring for configuration changes 168setting 9

Password Managementdownloading component 75using 74

personal security code 9-10phishing, protection from 62, 65, 71policies, resetting 59popularity heuristics 172preferences, setting 156processes

block or allow 138preventing changes 40

protection statistics 146proxy server settings 169publications, Webroot 185

Q

quarantinedeleting items from 55managing file detection 56restoring items from 55using antimalware tools 58

R

Realtime shield, changing settings 32Recycle Bin, deleting contents 120registry streams, clearing history 125removal script 59renewing subscription 152resource usage 156, 165rootkits, protection against 27

S

safe mode, rebooting in 59SafeStart sandbox, using 140

Index

- 195 -

Page 202: SecureAnywhere for PCs User Guide

scansautomatic scanning 18changing preferences 25changing schedule 22disabling automatic schedule 24hide progress window 24launching on bootup 24reducing memory usage 27removing a specific threat 59running from Windows Explorer 27running on-demand 19saving a scan log 142scan new or modified files 34suppresing during games or movies 24suppressing on battery power 24viewing scan results 18

screen capture programs, allowing 65screen grabbers, protecting from 72screensaver, resetting 59search engine results

analyzing 43Web Threat protection 45

Secure File Removal 132SecureAnywhere editions 2Security Center, listing SecureAnywhere in 164security code 9security question and answer 9self protection 180set and forget protection 156settings

access control 166basic configuration 162heuristics 172importing or exporting to another

computer 177proxy server 169self protection 180

shieldsautomatic blocking 34

automatic quarantine 34Behavior shield 35Core System shield 38disabling 30Offline shield 30Realtime shield 32USB shield 30viewing settings 30Web Threat shield 41Zero Day shield 30

shortcut, desktopdisplaying after installation 164including in installation 5

shredding files 132shutdown command, removing from tray

menu 165software updates 153splash screen, disabling on bootup 164Start Menu, removing SecureAnywhere

from 164starting SecureAnywhere 12statistics, protection 146status, viewing 15submit a file to Webroot 187subscription, extending 152support options 184sync folders

adding 88disabling from sync 95sharing across computers 92

synchronizing files 81System Analyzer 143System Cleaner

changing application settings 126changing Internet Explorer history 128changing Windows Desktop settings 120changing Windows system settings 123running a cleanup 114running from Explorer 118

User Guide for PCs

- 196 -

Page 203: SecureAnywhere for PCs User Guide

running on a schedule 117running on bootup 118using Secure File Removal 132viewing the cleanup log 135

System Control 138system requirements 2System Temp folder, clearing 125system tray icon, showing 164system tray menu 14

T

Technical Support 184threat log, saving 186tray alerts 14

U

uninstalling SecureAnywhere 7updates

automatically downloading 164checking for 153

URL grabbing attacks, protection from 71URL history, clearing 130USB heuristics 174USB shield 30users, disabling access for 168

W

wallpaper, resetting 59Web Threat shield 41Webroot publications 185Webroot Support 184website surfing, protection 44website threat protection 44website whitelists and blacklists 42Windows Desktop, removing history traces 120Windows firewall 48Windows Temp folder, clearing 124

Windows, removing activity traces 123

X

X in search results 45

Z

Zero Day shield 30

Index

- 197 -

Page 204: SecureAnywhere for PCs User Guide