This site needs to use cookies to function correctly.

Please click the button to accept our cookies. Some may have been set already. Read about our cookies and how to manage them.

Allow Cookies

About Cookies

Cookies are files stored in your browser and are used by most websites to help personalise your web experience.

They enable this website to remember you, either for the duration of your visit using a Session Cookie or for repeat visits using a Persistent Cookie.

Some features on this site will not function if you do not allow cookies.

Our Cookies

We only use "First party cookies" that are set or read by this website.

We do not use "Third party cookies" where your information is passed to other websites, such as where advertising is targeted to you across the web based upon your browsing habits.

Managing Your Cookies

Most web browsers allow some control of most cookies through the browser settings.

To find out more about cookies, including how to see what cookies have been set and how to manage and delete them, visit www.allaboutcookies.org.


Close Up

Changing Identity shield settings

The Identity shield protects sensitive data that may be exposed during your online transactions. If desired, you can change the behavior of the Identity shield and control what it blocks.

To change Identity shield settings:

  1. Open the main interface.

  2. At the bottom left, click Settings.

    SettingsLink.png

  3. In the Settings dialog, click Identity Shield.

    SettingsIdentityShield.png

  4. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When you're done, click the Save All button.

Note: We recommend that you keep Webroot's default settings. If you make changes and decide you want to return to the recommended settings, click the Reset to Defaults button.

The settings are described in the table below.

Identity shield settings

Look for identity threats online

Analyzes websites as you browse the Internet or open links. If the shield detects any malicious content, it blocks the site and opens an alert.

Analyze websites for phishing threats

Analyzes websites for phishing threats as you browse the Internet or open links. If the shield detects a phishing threat, it blocks the site and opens an alert.

Phishing is a fraudulent method used by criminals to steal personal information. Typical scams might include websites designed to resemble legitimate sites, such as PayPal or a banking organization, which trick you into entering your credit card number.

Verify websites when visited to determine legitimacy

Analyzes the IP address of each website to determine if it has been redirected or is on our blacklist. If the shield detects an illegitimate website, it blocks the site and opens an alert.

Verify the DNS/IP resolution of websites to detect Man-in-the-Middle attacks

Looks for servers that could be redirecting you to a malicious website (man-in-the-middle attack). If the shield detects a man-in-the-middle attack, it blocks the threat and opens an alert.

Block websites from creating high risk tracking information

Blocks third-party cookies from installing on your computer if the cookies originate from malicious tracking websites.

Cookies are small bits of text generated by a web server and then stored on your computer for future use. Cookies can contain everything from tracking information to your personal preferences.

Prevent programs from accessing protected credentials

Blocks programs from accessing your login credentials (for example, when you type your name and password or when you request a website to remember them).

Warn before blocking untrusted programs from accessing protected data

Opens an alert any time malware attempts to access data, instead of blocking known malware automatically. (This option is for technical users only; we recommend that you keep this option disabled so the program does not open numerous alerts.)

Allow trusted screen capture programs access to protected screen contents

Allows you to use legitimate screen capture programs, no matter what content is displayed on your screen.