This site needs to use cookies to function correctly.

Please click the button to accept our cookies. Some may have been set already. Read about our cookies and how to manage them.

Allow Cookies

About Cookies

Cookies are files stored in your browser and are used by most websites to help personalise your web experience.

They enable this website to remember you, either for the duration of your visit using a Session Cookie or for repeat visits using a Persistent Cookie.

Some features on this site will not function if you do not allow cookies.

Our Cookies

We only use "First party cookies" that are set or read by this website.

We do not use "Third party cookies" where your information is passed to other websites, such as where advertising is targeted to you across the web based upon your browsing habits.

Managing Your Cookies

Most web browsers allow some control of most cookies through the browser settings.

To find out more about cookies, including how to see what cookies have been set and how to manage and delete them, visit

Close Up

Changing Behavior shield settings

The Behavior shield analyzes the applications and processes running on your computer. If it detects a suspicious file, it opens an alert and prompts you to block or allow the item. If it detects a known threat, it immediately blocks and quarantines the item before it causes damage to your computer or steals your information.

To change shield settings:

  1. Open the main interface.

  2. At the bottom left, click Settings.


  3. From the Settings dialog, click Behavior Shield.


  4. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When you're done, click the Save All button.

Note: We recommend that you keep Webroot's default settings. If you make changes and decide you want to return to the recommended settings, click the Reset to Defaults button.

The settings are described in the table below.

Behavior shield settings

Assess the intent of new programs before allowing them to execute

Watches the program's activity before allowing it to execute. If it appears okay, Webroot SecureAnywhere allows it to launch and continues to monitor its activity.

Enable advanced behavior interpretation to identify complex threats

Employs a thorough analysis of a program to examine its intent. (For example, a malware program might perform suspicious activities like modifying a registry entry, then sending an email.)

Track the behavior of untrusted programs for advanced threat removal

Watches programs that have not yet been classified as legitimate or as malware.

Automatically perform the recommended action instead of showing warning messages

Does not prompt you to allow or block a potential threat. Webroot SecureAnywhere will determine how to manage the item.

Warn if untrusted programs attempt low-level system modifications when offline

Opens an alert if an unclassified program attempts to make changes to your system when you are offline. (Webroot SecureAnywhere cannot check its online threat database if you are disconnected from the Internet.)