This site needs to use cookies to function correctly.

Please click the button to accept our cookies. Some may have been set already. Read about our cookies and how to manage them.

Allow Cookies

About Cookies

Cookies are files stored in your browser and are used by most websites to help personalise your web experience.

They enable this website to remember you, either for the duration of your visit using a Session Cookie or for repeat visits using a Persistent Cookie.

Some features on this site will not function if you do not allow cookies.

Our Cookies

We only use "First party cookies" that are set or read by this website.

We do not use "Third party cookies" where your information is passed to other websites, such as where advertising is targeted to you across the web based upon your browsing habits.

Managing Your Cookies

Most web browsers allow some control of most cookies through the browser settings.

To find out more about cookies, including how to see what cookies have been set and how to manage and delete them, visit

Close Up

Managing protected websites

The Identity shield already includes the recommended security settings for specific types of websites. If desired, you can adjust security for a website to one of the following levels:

  • None. Provides unfiltered access to all potentially malicious content. (Not recommended.)

  • Low. Protects stored data and identifies malware in real time. You may want to use this setting if you have an application that does not work properly when the security level is set to Medium or higher.

  • Medium. Protects your stored data while also providing software compatibility. You may want to use this setting if you have an application that does not work properly when the security level is set to High or Maximum.

  • High. Provides strong protection against threats, while still enabling screen accessibility for impaired users (for example, allows text-to-speech programs to run normally).  

  • Maximum. Provides maximum protection against threats, but blocks screen accessibility for impaired users.

When you load a "protected" website, the Webroot icon in the system tray displays a padlock: Icon_lock.png.

Note: The Identity shield only protects a secured website when the browser window is active in the foreground window (the padlock is shown in the tray icon). For full protection from screen grabbers, information-stealing Trojans, and other threats, make sure the browser window is in the foreground and you see the padlock in the tray icon.

If the Identity shield encounters a website that may be a threat, it opens an alert. You can decide whether you want to stay secure (click Block) or continue despite the warning (click Allow).

To manage settings for protected websites:

  1. Open the main interface.

  2. Click Identity & Privacy.

  3. From the Identity Shield tab, click View/Edit Protected Websites.


    The Protected Websites panel opens. Webroot has already applied protection policies to HTTP/HTTPS websites and some social networking sites. If you add individual websites to this list and select custom security options, Webroot first applies the HTTPS or HTTP policies, then layers your user-defined policies on top.  


  4. In the Protected Websites table, click in the row for the type of website you want to adjust. To include an individual site, enter the address in the field at the top of the dialog, then click Add Website.

  5. Adjust the slider for minimum to maximum protection configuration. As an alternative, you can also select the individual protection options by clicking on the green checkmark or red X. (A green checkmark indicates the option is on; a red X indicates the option is off.) When you're done, click Save.

    Each protection option is described below:

Website protection options

Block phishing and known malicious websites

Alerts you to phishing sites and other malicious sites listed in our Webroot database.

Phishing is a fraudulent method used by criminals to steal personal information. Typical scams might include websites designed to resemble legitimate sites, such as PayPal or a banking organization, which trick you into entering your credit card number.

Protect cookies and saved website data

Alerts you if a malicious program attempts to gather personal data from cookies installed on your computer.

Cookies are small bits of text generated by a web server and then stored on your computer for future use. Cookies can contain everything from tracking information to your personal preferences.

Detect and prevent man-in-the middle attacks

Alerts you if a server is redirecting you to a malicious website (man-in-the-middle attack). This is a method of intercepting communications between two systems and stealing data.

Protect against keyloggers

Stops keyloggers from recording keystrokes on your computer. Keyloggers may monitor emails, chat room dialogue, instant message dialogue, websites visited, usernames, passwords, programs run, and any other typed entries. They have the ability to run in the background, hiding their presence.

Protect sensitive clipboard data

Stops malware programs from capturing clipboard data. The clipboard is a utility that allows you to cut and paste stored data between documents or applications.

Protect against URL grabbing attacks

Hides your web browsing activity from malware that attempts to log the websites you visit.

Protect browser components from external access

Hides your web browsing activity from malware that attempts to modify your browser with memory injection and other behind-the-scenes attacks.

Protect against Man-in-the-Browser attacks

Blocks a malicious toolbar from stealing data. A man-in-the-browser attack is a Trojan that infects a web browser. It can modify pages and the content of your transactions without being detected.

Isolate untrusted browser add-ons from data

Blocks a browser add-on (browser helper object) from stealing data. While most browser add-ons are legitimate, some can display ads, track your Internet activity, or hijack your home page.                

Block browser process modification attempts

Analyzes browser memory to see if code injection is taking place.

Protect against screen grabbing attacks

Blocks a malicious program from viewing and capturing your screen content.

Block suspicious access to browser windows

Blocks a malicious program from viewing and capturing data in Windows components.