This site needs to use cookies to function correctly.

Please click the button to accept our cookies. Some may have been set already. Read about our cookies and how to manage them.

Allow Cookies

About Cookies

Cookies are files stored in your browser and are used by most websites to help personalise your web experience.

They enable this website to remember you, either for the duration of your visit using a Session Cookie or for repeat visits using a Persistent Cookie.

Some features on this site will not function if you do not allow cookies.

Our Cookies

We only use "First party cookies" that are set or read by this website.

We do not use "Third party cookies" where your information is passed to other websites, such as where advertising is targeted to you across the web based upon your browsing habits.

Managing Your Cookies

Most web browsers allow some control of most cookies through the browser settings.

To find out more about cookies, including how to see what cookies have been set and how to manage and delete them, visit www.allaboutcookies.org.


Close Up

Managing protected applications

You can provide additional security for software applications that may contain confidential information, such as Instant Messaging clients or tax preparation software. By protecting these applications, you secure them against information-stealing Trojans like keyloggers, man-in-the-middle attacks, and clipboard stealers.

As you work on your computer, Webroot SecureAnywhere automatically adds web browsers and applications to the Protected Applications list. It assigns applications to one of these levels of protection:

  • Protect. "Protected applications" are secured against information-stealing malware, but also have full access to data on the system. By default, web browsers are assigned to the "protected" status. If desired, you might also want to add other software applications to "protected," such as financial management software. When you run a protected application, the Webroot icon in the system tray displays a padlock Icon_lock.png.

  • Allow. "Allowed applications" are not secured against information-stealing malware, and also have full access to protected data on the system. Many applications unintentionally access protected screen contents or keyboard data without malicious intent when running in the background. If you trust an application that is currently marked as "Deny," you can change it to "Allow."

  • Deny. "Denied applications" cannot view or capture protected data on the system, but can otherwise run normally.  

To manage the application list and specify levels of protection:

  1. Open the main interface.

  2. Click Identity & Privacy.

  3. From the Identity Shield tab, click View/Edit Protected Applications.

    IdentityShieldViewApps.png

    The Protected Applications panel opens. This panel shows the web browsers on your system and any other applications that you run on the computer.

    OnlineSecurityProtectedApps.png

  4. In the row for the application you want to modify, click the radio button for Protect, Allow, or Deny. (To include another application in this list, click Add Application, then select an executable file.)

  5. When you're done, click Close.