This site needs to use cookies to function correctly.

Please click the button to accept our cookies. Some may have been set already. Read about our cookies and how to manage them.

Allow Cookies

About Cookies

Cookies are files stored in your browser and are used by most websites to help personalise your web experience.

They enable this website to remember you, either for the duration of your visit using a Session Cookie or for repeat visits using a Persistent Cookie.

Some features on this site will not function if you do not allow cookies.

Our Cookies

We only use "First party cookies" that are set or read by this website.

We do not use "Third party cookies" where your information is passed to other websites, such as where advertising is targeted to you across the web based upon your browsing habits.

Managing Your Cookies

Most web browsers allow some control of most cookies through the browser settings.

To find out more about cookies, including how to see what cookies have been set and how to manage and delete them, visit www.allaboutcookies.org.


Close Up

Managing file detection

If you want more control over scans and shielding when Webroot SecureAnywhere encounters a specific executable file, you can use Detection Configuration to specify one of the following actions:

  • Allow. Ignore the file during scans and shielding.

  • Block. Stop a file from executing or being written to your computer.

  • Monitor. Watch the program to determine if it is legitimate or related to malware.

Detection configuration acts as an override to Webroot SecureAnywhere's default scanning and shielding behavior.

To use Detection Configuration:

  1. Open the main interface.

  2. Click PC Security, then click the Quarantine tab.

  3. Under Detection Configuration, click the Configure button.

    QuarantineConfig.png

    The Detection Configuration panel opens.

    QuarantineDetectionConfig.png

  4. You can add executable files to this list. (Executable files typically have an extension of exe, dll, sys, drv, or com.) To add files, click the Add File button. You can also drag and drop a file from Explorer.

    The file name appears in the Threat column. (If Webroot SecureAnywhere detected other copies of this file with different file names, it only shows the file name that it last detected.)

  5. In the right column, select the radio button for either Allow, Block, or Monitor.

    If you want to clear the list, click the Remove all button.


CNTNT:17