Please click the button to accept our cookies. Some may have been set already. Read about our cookies and how to manage them.
Allow CookiesIf you want more control over scans and shielding when Webroot SecureAnywhere encounters a specific executable file, you can use Detection Configuration to specify one of the following actions:
Allow. Ignore the file during scans and shielding.
Block. Stop a file from executing or being written to your computer.
Monitor. Watch the program to determine if it is legitimate or related to malware.
Detection configuration acts as an override to Webroot SecureAnywhere's default scanning and shielding behavior.
To use Detection Configuration:
Open the main interface.
Click PC Security, then click the Quarantine tab.
Under Detection Configuration, click the Configure
button.
The Detection Configuration panel opens.
You can add executable files to this list. (Executable
files typically have an extension of exe, dll, sys, drv, or com.)
To add files, click the Add File
button. You can also drag and drop a file from Explorer.
The file name appears in the Threat column. (If Webroot SecureAnywhere
detected other copies of this file with different file names, it only
shows the file name that it last detected.)
In the right column, select the radio button for either
Allow, Block,
or Monitor.
If you want to clear the list, click the Remove
all button.
CNTNT:17