Home
Webroot Spy Sweeper User Guide
Contents
1. 14 shields for 29 signs of infection 60 Tracking Cookies shield 34 tray menu 6 U uninstalling the program 57 updates changing update preferences 48 stopping with Gamer mode 50 Use custom scan settings 19 V View scan details 17 viruses scanning for 14 shields for 29 signs of infection 60 vulnerable status 7 Ww WARN program 49 Webroot account creating 2 launching in browser 6 problems creating 3 signing in 4 Webroot master password creating 2 Webroot Shields 29 Webroot support 55 Windows Security Center message 61 Index 75 76 Index
2. 8 pop up in the middle of your screen 8 pop up in the system tray 9 responding to 8 stopping with Gamer mode 50 viewing more details after it closes 9 viewing more details in pop up alerts 8 automated scans about 13 turning off 21 B BHO shield 32 Browser Helper Objects 32 Browser Protection shields 33 C Cleaned status virus cleaning 18 colors on home panel 5 7 compressed files scanning 20 cookies scanning for 20 shield for 34 why it detects so many 62 creating your account 2 D definitions updates 49 Detected status during scans 15 drives scanning 20 E email address resetting for account 3 Email Attachments shield 37 Execution shield 31 F fake dialogs 63 FAQs 59 Favorites shield 34 File System shield 31 Forgot Your Password dialog 4 G Gamer mode changing timer 51 enabling from system tray 6 turning on and off 50 H Help launching from Home panel 6 launching from system tray 6 history viewing 47 home panel description 5 opening 5 protection status 7 Hosts File shield 36 l IE Hijack shield 34 IE Security shield 34 Ignore selected items 15 installing the software on another computer 42 64 Internet Communication shield 36 K keycode viewing 40 42 65 L language changing for interface 54 Licenses and Products 42 M main interface description 5 opening 5 protection status 7 malware Index 73 how it gets on your computer 60 scanning for 14 shields for 29
3. Cleaner has completed 5 20 2010 9 16 30 AM System Cleaner Index dat files will be removed on reboot 5 20 2010 9 16 30 AM Scan Completed 5 20 2010 9 08 32 AM Sweep Quarantined c documents and settings administratorcookies administrator doubleciick 1 t 5 20 2010 9 08 21 AM Sweep Quarantined c documents and settings administratoricookies administrator atdmit 2 txt 5 20 2010 9 08 16 AM Scan Started 5 20 2010 8 42 08 AM Firewall Network Detected 111 111 11 0 subnet mask 255 255 255 0 5 20 2010 8 40 26 AM To display all activity click the All radio button To display only the activity for the last 30 days click the Last 30 Days radio button To clear the contents of this panel click the Clear history button Click the Close button at the top right to close the panel 6 Program Settings 47 Managing updates The Webroot software is preconfigured to check for updates once a day When available the following items download during updates Product updates which include new versions of the Webroot program Protection updates which include the latest security definitions used to determine if any items found on your computer match spyware viruses or other threats You must be connected to the Internet for update checks to be successful o Note Microsoft Silverlight is installed along with your Webroot software On occasion you may receive notifications from Microsoft about updating Silverlight To check f
4. Webroot account 1 Make sure you are connected to the Internet 2 Open the Webroot main interface by double clicking the Webroot icon in the system tray 3 From the taskbar at bottom of the Home panel click My Account My Account k Settings Support Notifications The My Account panel opens and shows your keycode version number and other information about your subscription 4 Click the Manage My Account button at the bottom of the panel My software Product name Installed on Expires I9 Webroot Antivirus with SpySweeper JGALLAGH DE3I Jul 27 2010 itemm If you have not previously created an account an account creation dialog opens as shown in the following example If you have previously created an account the My Webroot site opens in a browser and you do not need to follow these instructions 2 1 Getting Started My Account creation To use this feature you need to create a Webroot My Account With My Account you will be able to manage your account information passwords and stored files Click Create Account to begin A Step 1 Create your account Provide some basic information that will identify your account Step 2 Verify your email Lr Check your email for a message from Webroot confirming the account r Step 3 Activate your account Follow the link in the email and sign in to your account Create account l do this later 5 Click the Create account button and follow the on screen instruc
5. click the Apply button Help My Account Settings Support Notifications Languages Language Select your preferred language below and click Apply English e Japanese AP ty The program begins updating to the new language a process that may take a few minutes 54 6 Program Settings A Webroot Support Webroot provides the following technical support services Web Site To submit a trouble ticket to our service representatives access the Support Web site at support webroot com We make every effort to respond to your request on the same day you send it in but please allow up to 48 hours Phone For contact information access the Support Web site at support webroot com To access technical support options l Open the Webroot main interface by double clicking the Webroot icon in the system tray From the taskbar in the bottom of the Home panel click Support My Account Settings Support Notifications Click the Visit now button to open the Webroot Support site in your browser You must be connected to the Internet Or call the number listed to speak to a representative Web support Get answers to frequently asked questions or submit a trouble ticket r Available 24 hours a day A Webroot Support 55 56 A Webroot Support B Uninstalling the program To uninstall the Webroot software 1 From the Start menu click Start in the system tray point
6. have many legitimate uses such as allowing you to display a PDF file within your browser or to install a search box for your toolbar However many spyware programs also use BHOs to display ads track your Internet activity or hijack your home page If a BHO alert opens while you are intentionally downloading a new toolbar or other plug in you can allow the installation Otherwise block it cookies Cookies are small text files generated by a Web server and then stored on your computer for future use For Internet Explorer cookies are stored as separate files For Firefox cookies are stored in one file Cookies can contain everything from tracking information about sites you visited to your personal preferences Cookies cannot steal information off your machine but some do store personal information that you may not want outside parties to gather The System Scanner only searches for third party cookies associated with advertising sites that may be gathering information about your surfing habits definitions A security definition is a set of fingerprints that characterize viruses spyware adware or other types of unwanted items Webroot regularly updates these definitions to provide better protection against the latest versions of these security threats dialer Dialers are software packages that connect your computer to the Internet via a modem hooked to a phone jack Malicious dialers may disconnect your computer from your Internet
7. marks the status as Suspect as shown in the following example You must take action yourself by selecting the item in the panel and choosing either the Quarantine selected items or Ignore selected items button 2 Security Scans 15 What we found Risk Status Details 7 App Spycar Gen Suspect X Select all Deselect al Quarantine selected items Ignore selected items Finish After the Webroot software manages the items it opens a notification in the system tray You can click View Details to see more information about what items were quarantined If the alert closes before you have a chance to click the link point your mouse to the PC Security panel click the Edit settings button then click View scan details in the Scan tab Webroot Security Scan complete We detected 2 items Click View Details to see the results View Details See the next section Viewing scan details for more information Viewing scan details You can view results of the last scan from the Scan panel To view scan details 1 Open the Webroot main interface by double clicking the Webroot icon in the system tray 2 From the Home panel click the Edit settings button under PC Security PC Security Scan now The PC Security panel opens 3 Make sure the Scan tab is selected 16 2 Security Scans 4 Under Last scan click View scan details Scan for viruses spyware and other threats Last scan Mace pem aep trit e ci
8. signs of infection 60 memory scanning 20 multiple installations 64 My Account changing password 41 creating support tickets 43 editing contact information 41 managing 39 viewing details 40 My Account creation dialog 3 My Webroot creating a Webroot account 2 description of pages 12 launching in browser 6 opening 11 signing in 4 N Network Protection shields 35 notifications removing from panel 11 responding to 10 viewing more information 10 P password changing Webroot master password 41 creating Webroot master password 2 forgotten Webroot master password 4 Perform Secure Scan 15 proxy server settings 52 Q Quarantine 23 about the process 23 deleting items from 25 determining what to do with items 23 restoring items to original locations 26 viewing items stored in 24 what to do with items 62 Quarantine selected items 15 Quarantined status 18 R real time active protection shields 30 registry items scanning 20 Removed status 18 renewing your subscription 42 risk levels in scans 17 rootkits scanning for 20 Scan in Progress panel 15 scanning 13 actions against threats 15 creating schedule 21 customizing 19 description of process 13 launching from home panel 14 launching from system tray 14 launching from Windows 15 malware vs legitimate programs 61 only new or changed files 20 operation in background 61 risk levels of items found 17 skipping file types 20 turning off automated 21 USB or CD 62 v
9. the domain is listed for example webroot com your computer goes directly to the IP address If the domain is not listed your computer looks up the information from the Internet a slightly slower process HTML HyperText Markup Language is a method used to display content in Web pages HTTP Hyper Text Transfer Protocol is a set of rules for transferring files text graphics sound etc on the World Wide Web As soon as you open a Web browser you are indirectly using HTTP IP address An Internet Protocol address identifies a machine computer or server on the Internet The address is a series of four numbers separated by periods for example 64 78 182 210 Your own computer s IP address may be the same address during every Internet connection called a static IP used in most T1 DSL connections or it may change for each Internet connection called a dynamic IP used in most cable dial up connections keylogger A keylogger is a type of system monitor that has the ability to record all keystrokes on your computer It may monitor keystrokes emails chat room dialogue instant message dialogue Web sites visited usernames passwords programs run and any other typed material They have the ability to run in the background hiding their presence Keyloggers and system monitors may be used for legitimate purposes but can also be installed by a user to record sensitive information for malicious purposes malware Malware is shor
10. threats before they can enter o Note The Webroot software acts like a personal security guard for your computer blocking bad guys from entry and searching the premises for any others that may have slipped through the cracks If it finds threats it disables them and ejects them into Quarantine before they cause any harm The first time the System Scanner searches your computer it may locate and quarantine many different types of threats that were previously running on your computer probably without your knowledge For detailed descriptions of the various types of malware see the Glossary How do know if my computer is infected The Webroot software actively protects your computer from malware infections at all times However even with the best security protection you can accidentally allow malware to gain access to your computer This could happen if you clicked Allow in an alert screen for a program that you didn t realize was associated with malware If you notice any of the behaviors listed below run a scan immediately see Scanning for threats on page 14 e If you see pornographic images or advertisements unexpectedly appear on your screen you probably have a malware infection Certain Web sites contain traps that take control of your browser and cause pornographic or advertising sites to open when you try to exit e Your computer is slow to boot slow to process crashes frequently or behaves in erratic ways e Y
11. webroot AntiVirus with Spy Sweeper 2011 User Guide Webroot Software Inc PO Box 19816 Boulder CO 80308 www webroot com Version 7 0 9 Webroot AntiVirus with Spy Sweeper User Guide Version 7 0 9 March 31 2011 2003 2011 Webroot Software Inc All rights reserved Webroot Spy Sweeper Webroot AntiVirus with AntiSpyware and the Webroot and Spy Sweeper icons are trademarks or registered trademarks of Webroot Software Inc Included antivirus software 2000 2011 Sophos Group All rights reserved Sophos and Sophos Anti Virus are registered trademarks of Sophos Plc and Sophos Group All other product and company names mentioned may be trademarks or registered trademarks of their respective owners Contents 1 Getting Started iiscusooRu RR RERERERERRENEFERRERTERE SIG FEZEAXRERRRATRERGS 1 Creating a Webroot account 0 cc hm 2 Signing in to your Webroot account 0 0 0 hn 4 Using the main interface 0 0c tenets 5 Using the Webroot system tray menu 0 6 Viewing protection status 0 0 0 cette eae 7 Responding to alerts 002 ccc ahh 8 Responding to pop up alerts 2 00 eects 8 Responding to balloon alerts 2 0 n 9 Responding to notifications lille hm m mre 10 Using My Webroot ss i errer im etiain Tur rasa Lu pared UU EAR aud spa RE RA de 11 2 Security SCANS cnesakakkmRRAEA EG ARERAMARERIRRARSASESHERARNEMERRAA RS 13 Scanning To
12. you do not respond within the allotted time shown in the alert counter usually 60 seconds the Webroot Shields automatically block the activity Q Note If a pop up alert opens and you aren t certain whether to allow or block the detected item your safest action is to block it The name of the file trying to download is displayed in the alert box Click Show Details for more information or contact Webroot Support To respond to pop up alerts 1 Read the alert text to determine what type of program is attempting to download to your computer You can click the arrow next to Show Details to view the name file name company and copyright of the program The following example shows an alert detected by the Webroot Shields 8 1 Getting Started A Browser Helper Object BHO is installing on your computer i The following it been detected SS Category installing BHO Shield watches for installation of Browser Helper Objects BHOs which are add ons to your browser Always perform the selected action w Show Details Allow Block For your protection Webroot will automatically block installation in 60 seconds Time Remaining 53 seconds 2 Click the Block button if you do not recognize the program and were not trying to download anything as you viewed pages on the Internet or Click the Allow button if you do recognize the program and you are purposely downloading it i Note Some alerts provid
13. 6 17 2010 12 02 PM nd 2 tems detected Quarantined 2 items Scan now dee scan deus w Automated scanning B o The system is taking care of you Learn more about this gt Schedule scans manually Another panel opens and provides details about detected items Scan complete What we found Risk Status Details n Found 2 item s detected atlas dmt cookie Quarantined S CAdocuments and settings administratoricookies administrator atamy2 txt Quarantined 2 item s doubleclick cookie i Quarantined t We have automatically taken care of the tems fou any ite further 4 iv Finish See the following table for a description of the Scan Complete panel Scan details What we found Name and description of the item You can click the plus sign to the left of the item to view the directory where it was found Risk The red orange bars show the risk level of the selected item Multiple bars indicate a higher risk as follows ow 8 amp 6 moderate 6 high 0008 very high 00008 critical 2 Security Scans 17 Scan details continued Status This column shows how the System Scanner managed the item Quarantined The item was moved to Quarantine where it was rendered inoperable and cannot harm your computer For more information see Chapter 3 Quarantine on page 23 If you see a Quarantined Error status contact Webroot Support Suspect The item is classif
14. Edit opbons Protects Windows system settings and stor threats from launching Y x d a e e v Browser protection Protects your default home page lis favorites and other browser settings E The Options pane displays the shield settings Items with a checkmark are enabled 6 If you want to change a shield setting select the checkbox next to the shield name to disable uncheck or activate check an option The following table describes the function of each Browser Protection shield 4 Shields 33 IE Hijack shield Browser Protection shield options If this shield detects a spyware program trying to change the default pages that open in Internet Explorer such as your set Home page it opens an alert where you can allow or block the change To check or change the default pages for Internet Explorer click Edit options The following dialog opens IE Hijack Shield Options Whenever a program tries to change these pages Webroot can alert you IE Home Page shield Use this page IE Search Page shield Use this page about blank Reset IE page settings to defaults OK Cancel You can edit the following addresses IE Home Page shield In the field you can enter a new Web site address for your Home page The address must be in the following format http www webroot com IE Search Page shield In the field you can enter a new Web address for the informational page that opens when you attempt to access a n
15. Glossary 69 SMTP Simple Mail Transport Protocol is a method used for sending text based information email Because SMTP is limited in its receiving functions it is often used with two other protocols POP3 or IMAP These protocols let you save messages in a server mailbox and download them periodically from the server spam Spam is unsolicited junk mail sent to your email address Its sole purpose is to lure you into buying their product or service The term spam originated with a Monty Python sketch and song the lyrics of which kept repeating the words SPAM SPAM SPAM much like endless unwanted email spy cookie A spy cookie is a Webroot term for a third party cookie associated with advertising sites that may be gathering information about your surfing habits spyware Spyware is a program that may either monitor your online activities or possibly install programs without your consent Information about online activities may be subsequently sent to a third party for malicious purposes without your knowledge Spyware may arrive bundled with freeware or shareware through email or instant messenger may propagate itself using dialog boxes various social engineering methods scripting errors or by someone with access to your computer system monitors System monitors typically non commercial may monitor and capture your computer activity including recording all keystrokes emails chat room dialogue instant m
16. IT department or potential spyware programs have added to your Hosts file Hosts File Shield Options Adcress IP Address in Hosts Fike Correct IP Address ioc ainost Select A Deselect A Remove selected Cancel If any entries appear to be spyware related select the checkbox next to the address and click Remove selected If you aren t sure whether the entries are valid contact Webroot Support Caution Editing the Hosts file is for advanced users Internet This shield monitors communication from your computer to known Web Communication sites that are related to spyware or potential threats Webroot includes a list shield of known sites with its security definitions If the shield detects an attempt to communicate with a site on the list it opens an alert See Responding to pop up alerts on page 8 36 4 Shields Network Protection shield options continued Email Attachments This shield monitors file attachments for incoming email through POP3 shield protocol and outgoing email through SMTP protocol If it detects that an Does not support attachment or its contents match a security definition it replaces the email clients that use content of the attachment with an alert message that describes what it SSL found This shield then moves the original attachment to Quarantine where you can decide whether to save it to your computer or delete it You can also direct the shield to always restore qu
17. If desired you can permanently delete items in Quarantine Be aware that once you delete an item it cannot be restored i Note Before deleting items in Quarantine we recommend that you test your computer by opening and closing all your programs and performing a few tasks In rare cases programs classified as spyware may be an integral part of a legitimate application To permanently delete quarantined items 1 Open the Webroot main interface by double clicking the Webroot icon in the system tray 2 From the Home panel click the Edit settings button under PC Security PC Security Q Scan now eang o The PC Security panel opens 3 Click the Quarantine tab The Quarantine panel opens with a list of quarantined items 4 Select each item that you want to permanently delete or click Select All at the bottom of the panel A checkmark next to the item shows that it 1s selected and will be deleted 5 Click the Delete selected items button 3 Quarantine 25 What we found Risk 4 atlas dmt cookie doubleclick cookie i v Select al Deselect all Restore selected items The item is removed from the Quarantine panel If you check the last scan details see Viewing scan details on page 16 the item is still listed but with Deleted as its status Scan complete What we found Risk Status Details Found 2 item s detected atlas dmt cookie i Deleted a Quarantined 2 item s
18. My Webroot on page 11 If you have not created an account see Creating a Webroot account on page 2 To manage your Webroot account see the following topics e Viewing account details on page 40 Editing your contact information and password on page 41 Managing licenses and additional products on page 42 e Creating Webroot support tickets on page 43 5 My Account Management 39 Viewing account details Your account details are available from the My Account panel in the main interface and in My Webroot These details show your expiration date and your keycode To view account details from the main interface 1 Open the Webroot main interface by double clicking the Webroot icon in the system tray 2 From the taskbar at bottom of the Home panel click My Account My Account k Settings Support Notifications The My Account panel opens and shows your keycode version number and other information about your subscription E 4 My Account Settings Support Notifications 2 My software Subscription Product name Installed on Expires Days remaining I9 Webroot Antivirus with SpySweeper JGALLAGH DE Jul 27 2010 7 0 3 430 AT ST 410 710 definitions Virus engine version Manage My Account 3 7 1 1 632 558 definitions 3 To modify account details from My Webroot click the Manage My Account button To view account details from My Webroot 1 Open your brow
19. My Webroot opens with your account information select MyAccount from the top panel webroot TREE 3 Click the Contact Information tab 4 Enter your personal information in the fields If you want to change your password click the Edit Password link and follow the on screen instructions 5 When you re done click Update info Contact Information Licenses amp Products Support First Name Last Name Address 1 Address 2 City State Select state v ZIP Postal code Country UNITED STATES v Daytime phone Email address jgallagherWAVSS0528 webrootcom Edit Password Your email address is your login username would like to receive special offers and important product updates from Webroot Update info 5 My Account Management 41 Managing licenses and additional products You can view your Webroot license information for the status of any Webroot products you have purchased The license information includes the product name the keycode where the software is installed which computer and when your subscription expires You can also use this page to re install your licensed software install it onto another computer or renew your subscription To view your current licenses and upgrade your Webroot products 1 Open your browser and enter https www webroot com mywebroot In the Sign In panel enter your user name email address and password then click the Sign in button If you are already signed in this but
20. RL of the home page for example http www webroot com in the browser s address line You can also access specific 70 Glossary files using URLs for example ftp www webroot com sample txt The URL contains the name of the protocol to be used to access the file resource a domain name that identifies a specific computer on the Internet and a pathname for a specific file virus A virus is a self replicating program that can infest computer code documents or applications While some viruses are purposefully malignant others are more of a nuisance replicating uncontrollably and inhibiting system performance virus cleaning Virus cleaning is a Webroot procedure that removes infected portions of a file when a virus is detected during a sweep If the Webroot software can remove the virus successfully it restores the cleaned file to your computer in its original location and places a copy of the corrupted file in Quarantine The cleaned file is safe to use the file in Quarantine is not safe to use Glossary 71 72 Glossary Index A account changing password 41 creating 2 launching in browser 6 other users accessing 65 problems creating 3 resetting email address 3 signing in 4 viewing 40 viewing keycode 42 viewing subscription information 42 ActiveX shield 31 ADS shield 31 Advanced Scan Settings panel 19 alerts Always perform the selected action 9 blocking or allowing items 9 determining how to respond
21. Service Glossary 67 Provider ISP and reconnect you to the Internet using an expensive toll or international phone number They can accrue significant phone charges and can run in the background hiding their presence They generally propagate themselves using dialog boxes various social engineering methods through scripting errors or may be delivered with a Trojan horse firewall A firewall monitors data traffic traveling in and out of your computer s ports It can eliminate unauthorized access to your computer at home at the office or on the road Using a multi layered approach to defense Webroot s firewall can block malware hacking attempts and other online threats before they can enter and cause damage to your system host name A host name identifies a device connected in the Internet Computers on the Internet are often named WWW Computers on a network are usually single names that describe the computer such as accounting1 Host names can be part of a fully qualified domain name FQDN For example in www webroot com the www is the host name and webroot com is the domain name hosts file The Hosts file is a Windows file that helps direct your computer to a Web site using Internet Protocol IP addresses Your Web browser uses the IP address to actually connect to a site When you enter a Web address in a browser your computer first looks in the Hosts file to see if it already knows where to go If
22. To view the keycode for your software license open the Webroot main interface by double clicking the Webroot icon in the system tray From the taskbar at bottom of the Home panel click My Account My Account Settings Support Notifications The My Account panel opens and shows your keycode to the right 00 My Account Settings Support Notifications My software Subscription Product name Installed on Expires l Days remaining I Webroot Antivirus with SpySweeper JGALLAGH DE3F30 Sep 14 20 5 SSHA ONLN 420 471 definitions 1 792 288 definitions Manage My Account Can other users access my online account No one can access your account unless they know your Webroot master password However if you installed the Webroot software on additional computers these installations will all share a single Webroot account This means that anyone using these other computers can sign in to your online account if they know your user name and password If you have personal information in your account that you do not want to share do not provide other members in your household with your user name and master password Can multiple users access the Webroot software from one computer Yes if your computer is configured for multiple Windows user accounts each person logs in with a unique name and password the Webroot software is available to all those users Each user with administrative privileges has full access to all areas of the Webro
23. anning is enabled the System Scanner runs only when your computer is inactive If you start working on your computer while a scan is in progress it pauses and waits until the computer has been inactive again for 15 minutes then resumes scanning where it left off C Frequently Asked Questions 61 Can I quickly scan a USB or CD Yes even though the Webroot software is configured to automatically scan all areas of the computer you can run a quick scan yourself for a selected area such as a USB drive or CD You can run a quick scan by doing either of the following Targeting a specific file or folder in Windows Explorer Right click on the file or folder to open the pop up menu then select Perform Secure Scan This is the quickest method Customizing the scan options to search specific drives or file types See Customizing scan options on page 19 Are there times when I should run a scan myself In most cases you should not need to launch a scan because the Webroot software is configured to run scans automatically and to actively block threats with shields However you may want to run a scan yourself in the following circumstances Even if you don t surf high risk sites keep in mind that connecting to the Internet is like opening the front door to your computer In most situations no one will walk through but if you are not protected with the Webroot software you are leaving your computer vulnerable to bad guys who mig
24. arantined email attachments to a specific directory By default Webroot monitors port 110 POP3 for incoming mail and port 25 SMTP for outgoing mail but you can change the port numbers in the Email Attachments settings if necessary Note Some firewall configurations might prevent the Email Attachments shield from monitoring email For more information see the note on page 38 For Email Attachments Shield options click Edit options The following dialog opens Email Attachments Shield Options Restoring attachments e Always save t Documents and Settings Admir Select location Email port settings OK Cancel Set the options as follows Restoring attachments Select Ask me where to save every file if you want to be prompted when it restores quarantined attachments Select Always save to if you want to create a default location for restored email attachments You can enter a file location in the field or click Select location to browse directories from Windows Explorer Email port settings Enter the POP3 port number for incoming mail and the SMTP port number for outgoing mail This dialog automatically displays port numbers that most computers use for email communications If necessary change the port numbers or contact your ISP Internet Service Provider for the port numbers 4 Shields 37 Note Communication errors with the Email Attachments shield Some firewall applications from other vendors mig
25. are restores the selected items to their original locations and shows the restore status at the bottom of the panel QO Note If a selected item is part of an email attachment the Webroot software saves it to the location specified in the Always save to option of the Email Attachments shield or prompts you to select the location to restore the attachment if you selected the Ask me where to save every file option The item is removed from the Quarantine panel If you check the last scan details see Viewing scan details on page 16 the item is still listed but with Restored as its status 3 Quarantine 27 Scan complete Found 2 item s detected Quarantined 2 item s We have automatically taken care of the items found during the scan To restore any items from quarantine or to take further action you can go to the Quarantine tab atlas dmt cookie Goubleciick cookie View details View details 28 3 Quarantine 4 Shields Webroot Shields monitor functions related to your Web browser settings network communications between your computer and the Internet Windows system settings Windows Startup programs and email attachments If a suspicious item tries downloading or running on your computer Webroot Shields automatically block and quarantine the item For some types of shields an alert asks if you want to continue the download or block it If you don t respond to the aler
26. ay 2 From the taskbar at the bottom of the Home panel click Settings My Account Settings K Support Notifications The Settings panel opens 3 Click Scheduling 4 In the row for your scheduled event click either Edit Run Now or Delete E 4 My Account Settings Support Notifications 1 Scheduling Automated scheduling scan NIB Scheduled actions Cleanup X Add action Event Next event Cleanup every week 4 26 2010 12 00 00 AM E Run Now Delete 5 Click the Close button at the top right to close the panel 46 6 Program Settings Viewing the system history The History panel displays past Webroot software actions such as Scans automated scheduled and manual Quarantine actions Individual shield events Definition updates Product updates To view the detection history l Open the Webroot main interface by double clicking the Webroot icon in the system tray From the taskbar at the bottom of the Home panel click Settings My Account Settings Support Notifications The Settings panel opens Click History The System History panel shows a summary of events and the dates on which they occurred similar to the example below My Account Settings Support Notifications History System history Clear history Last 30 days Summary Date Your security definitions are up to date AS version 1704 AV version 3 7 1 Total Definitions 2 040 4 5 20 2010 9 4020AM System
27. but you can change that amount of time in the Options settings 50 6 Program Settings To manually turn off Gamer mode Do either of the following From the system tray right click on the Webroot icon and select Turn Gamer Mode OFF or a e From the main interface click Settings in the bottom taskbar click the Gamer Mode tab then click the button next to Gamer Mode so it displays OFF All program activities are re enabled including the previously set shields The Webroot software also contacts the Webroot server and checks for any updates o Note If you shut down and restart the Webroot software it disables Gamer mode on start up To change Gamer mode options 1 From the main interface click Settings in the bottom taskbar then click Gamer Mode The Gamer mode options appear in the middle panel Options You can set the following options Turn Execution Shield OFF when entering Gamer Mode When you set the program to Gamer mode all shields are turned off except for the Execution shield The Execution shield is important because it can stop potentially harmful executable files from launching on your computer If desired you can specify that the Execution shield is turned off along with all other shields Automatically turn Gamer Mode OFF after You can specify how long you want to run the program in Gamer mode before it automatically switches back to regular operations 2 Enter the nu
28. cause system instability This feature should only be used by experienced matically load when Internet Explorer starts Name Company Name File Name a SafeBrowsing Webroot Software Inc www webroot com c Program Files Wet vi Webroot Toolbar Webroot OK Cancel To see more information about an item click the executable name Not all programs provide additional details Deselect any BHOs you do not want to start then click OK Caution Editing BHOs is for advanced users Deselecting BHOs could cause your browser to not work properly or cause your computer to be unstable Do not attempt to disable the Webroot toolbar This may result in unexpected behavior and will disable access to some Webroot software functionality 32 4 Shields Setting browser protection Browser Protection shields guard your default Home page list of favorites and other settings related to your Web browser To set Browser Protection shields 1 Open the Webroot main interface by double clicking the Webroot icon in the system tray 2 From the Home panel click the Edit settings button under PC Security PC Security e The PC Security panel opens 3 Click the Shields tab 4 Click Let me set my options 5 Point your mouse to Browser protection and make sure the box to the left is checked Shields Give me recommended protection Let me set my options Shields Options w Real time active protection v IE Hijack shield
29. ciated with advertising not the helpful first party cookies that store your personal preferences for a particular Web site such as login information and shopping cart items If you want the System Scanner to ignore all cookies during scans see Customizing scan options on page 19 Shield FAQs How do know if should block or allow a download If the Webroot Shields detect a potential threat an alert opens and asks whether you want to allow the file to launch or block the file from launching Information about the item is shown in the alert dialog If you recognize the file name and you are purposely downloading it for example you were in the process of downloading a new toolbar for your browser click Allow to continue However we recommend that you run an on demand scan after downloading even legitimate items since malware can piggy back on any type of download See Scanning for threats on page 14 If you were not trying to download anything and were just viewing pages on the Internet you should block the file As you surf Internet sites you could be targeted for a drive by download where an unwanted program launches and silently installs on your computer as you view pages A Windows dialog says it found spyware but no Webroot alert appeared What do I do Don t click on it Unfortunately pop up windows from an Internet site can be designed to look like legitimate messages from Windows with the sole purpose of tryin
30. count If you are signed in already this selection displays Sign Out and logs out of your account Close Closes the Webroot software main interface Note Selecting Close does not stop currently active or scheduled tasks such as scans Viewing protection status To show your computer s overall protection status areas of the Webroot user interface change colors as follows Main Interface Color Icon Description Green Your computer is secure Yellow One or more messages require your attention Red Q One or more critical items require your intervention To view protection status 1 Open the Home panel of the Webroot software s main interface by double clicking the Webroot icon in the system tray 2 From the Home panel you can read a short description about the issue PC Security Automated scanning Kd Scan now Your computer is vulnerable Full protection enabled One or more critical shields are disabled itc View Details Edit settings Shields are running optimally Last scan The panel may also provide buttons for how to fix the issue or how to view more detailed information Fix it now The Webroot software will resolve the situation The action it takes depends on the issue For example if you turned off an important shield it will turn it back on e View Details The Webroot software opens a panel where you can view more information and fix the
31. count d MyAccount Contact Information Web Support ur license t ustomer support yf ang ota d check the subscription status Licenses amp Products Support Get answers to frequently asked questions search the knowledge base or submit a trouble ticket View web support Call Us 4 Q Speak to someone live in our US based support center Call 1 866 612 4227 Monday Friday 7am 6pm MST Submit a support ticket The following table describes the pages available in My Webroot My Webroot pages Home Serves as the main dashboard to all My Webroot functions available with your subscription and license MyAccount Shows your account details and software license information See Chapter 5 My Account Management on page 39 o Note If you install a new browser later after installing the Webroot program the Webroot toolbar will not appear in that browser until the next program update If you want to install the Webroot toolbar right away close your browser then go to the Windows Start menu select All Programs or Programs Webroot Tools Install Webroot Toolbar Webroot will download and install the toolbar 12 1 Getting Started 2 Security Scans The System Scanner searches all areas of your computer where potential threats can hide including drives files the Windows registry and system memory It looks for any files or other items that match our security de
32. ction after an item was moved to Quarantine Webroot allows you to restore it What are cookies and why does it find so many Every time you access an Internet site the server for that site may place small bits of text called cookies on your computer to store information about your interaction with it If you have accessed many different sites the System Scanner locates many different cookies You should not be alarmed if the System Scanner finds a large number of cookies Cookies do not pose a high risk for your computer s security because they cannot harm your computer or steal information However while some cookies can be helpful to your Internet browsing experience some third party cookies 62 C Frequently Asked Questions can be a privacy concern because they are placed on your computer by a different Web site other than the one you accessed Usually associated with on line advertising third party cookies can be used to track your movements as you surf the Internet and to create a profile of your viewing habits O Note For Internet Explorer cookies are stored as separate files For Firefox cookies are stored in one file Cookies are simple text files that store information about a Web site you visited They do not create pop up ads nor can they launch viruses In most cases cookie files do not contain any private information such as credit card numbers The System Scanner mainly sweeps for third party cookies asso
33. de and specify settings for a proxy server See Chapter 6 Program Settings on page 45 Support Opens the Support panel which provides Webroot Technical numbers and links Notifications Opens the Notifications panel which provides a list of status alerts See Responding to notifications on page 10 Using the Webroot system tray menu After you install the Webroot software a Webroot icon opens in the Windows system tray located in the bottom right of your computer desktop This icon provides access to Webroot s system tray menu and some common Webroot functions To open the system tray menu right click on the Webroot icon Q Home d Scan Now Tum Gamer Mode ON Help Launch My Account Sign Out Close The menu provides the following selections System Tray Menu Home Launches the main interface Scan Now Launches the System Scanner The icon changes to a Busy state See Scanning for threats on page 14 Turn ON OFF Turns Gamer mode on or off See Setting Gamer mode on page 50 Gamer Mode Help Launches the main Help file Launch My Account Launches an Internet browser and opens My Webroot See Using My Webroot on page 11 6 1 Getting Started System Tray Menu continued Sign In Sign Out If you are not signed in to your Webroot account this selection displays Sign In and launches a dialog window for you to enter your name and password to access your ac
34. doubleclick cookie u Restored are 4 lens Restoring quarantined items You may need to restore a quarantined item if you discover that a program is not working correctly without it In rare cases a piece of spyware is an integral part of a legitimate program and is required to run that program Some components with copy protection may not restore from Quarantine properly You must reinstall these programs from the original media or installation file O Note Never restore a file with a detected virus If the Webroot software was able to clean the file remove the virus safely it keeps the cleaned file in its original location and places a copy of the corrupted file in Quarantine The cleaned file is safe to use the file in Quarantine is not safe to use To restore quarantined items 1 Open the Webroot main interface by double clicking the Webroot icon in the system tray 2 From the Home panel click the Edit settings button under PC Security 26 3 Quarantine PC Security e The PC Security panel opens 3 Click the Quarantine tab The Quarantine panel opens with a list of quarantined items 4 Select each item that you want to restore A checkmark next to the item shows that it is selected and will be restored 5 Click the Restore selected items button What we found Risk atlas dmt cookie 7 doubleclick cookie i Select all Deselect all Delete selected items The Webroot softw
35. e an Always perform the selected action checkbox If Webroot frequently detects the same item you can select this checkbox so Webroot will always allow or block the item in the future Responding to balloon alerts If the Webroot software needs to report important system status or an issue that requires your attention it opens a balloon alert near the Webroot icon in the system tray These alerts are only visible for a short time maximum 30 seconds depending on the level of importance Information only Appears for 10 seconds and provides status information You do not need to take action e Action Appears for 15 seconds and provides a link for you to click and view more information These alerts require you to take action to resolve an issue Critical action Appears for 20 to 30 seconds and provides a link for you to click and view more information These alerts require you to take action to resolve a critical issue To respond to balloon alerts 1 Ifyou notice a link in the balloon alert such as View Notifications click the link The Webroot software s main interface opens with the Notifications panel displayed 2 Take action for each alert displayed in the Notifications panel For further instructions see Responding to notifications on page 10 i Note If the alert disappears before you can click on the link open the main interface double click the Webroot icon in the system tray then click Notifications a
36. eal your information Once the items are rendered inoperable the System Scanner moves them to Quarantine If the System Scanner detects a virus it removes infected portions of a file during a virus cleaning process If the System Scanner can remove the virus successfully it restores the cleaned file to your computer in its original location and places a copy of the corrupted file in Quarantine The cleaned file is safe to use the file in Quarantine is not safe to use Once items are moved to Quarantine your safest action is to simply keep them there Items in Quarantine are disabled and cannot harm your computer Keeping items in Quarantine also allows you to test your computer and determine if all your programs still work properly If you discover that some legitimate programs cannot function after an item was moved to Quarantine Webroot allows you to restore it To manage the Quarantine see the following topics Viewing quarantined items on page 24 e Deleting quarantined items on page 25 Restoring quarantined items on page 26 3 Quarantine 23 Viewing quarantined items Once items are quarantined you can view more information about them in the Quarantine panel To view quarantined items 1 Open the Webroot main interface by double clicking the Webroot icon in the system tray 2 From the Home panel click the Edit settings button under PC Security PC Security The PC Security panel opens 3 Click the Qua
37. ebroot software on another computer 20000202005s 64 What should do if forget my account password llli ee 64 How do I find my keycode 2 0 ce hr 65 Can other users access my online account liliis eee 65 Can multiple users access the Webroot software from one computer 65 Glossary A PERPCPTCTTPTTTTTTTUIUPTTT 67 i PTUS 73 1 Getting Started This guide describes how to use the Webroot AntiVirus with Spy Sweeper WAVSS software This Webroot software combines the 1 antispyware technology with industry leading antivirus protection for complete security To get started using the Webroot software see the following topics Creating a Webroot account on page 2 Signing in to your Webroot account on page 4 Using the main interface on page 5 Using the Webroot system tray menu on page 6 Viewing protection status on page 7 Responding to alerts on page 8 Responding to notifications on page 10 Using My Webroot on page 11 1 Getting Started Creating a Webroot account Your Webroot account includes your software license status and provides access to certain tasks such as upgrading your software and installing it on another computer if you purchased a multi user license The account is available online through My Webroot which is your personalized Web site available 24 hours a day every day of the year To create a
38. essage dialogue Web sites visited usernames passwords and programs run These programs are capable of taking screen shots of your desktop at scheduled intervals and storing the information on your computer in an encrypted log file for later retrieval A system monitor can run in the background hiding its presence These programs typically install via other threats such as music downloads and Trojan downloaders traces Traces are individual elements that make up the security definition database The more traces found and put into the definitions the more complete the removal of the potential threats Trojan horses A Trojan horse may take control of your computer files by using a program manager that allows a hacker to install execute open or close programs It can run in the background hiding its presence A Trojan is usually disguised as a harmless software program and may also be distributed as an email attachment Opening the program or attachment may cause an auto installation process that loads the downloader onto your computer and download third party programs on your computer resulting in the installation of unwanted programs without your knowledge or consent Trojans can also open a port on your computer that enable a hacker to gain remote control of your computer URL Uniform Resource Locator URL 1s the unique address for a file that is accessible on the Internet To access the home page of a Web site you can enter the U
39. et Notify me before downloading and installing product updates If selected updates do not download and install to your computer automatically Instead a notification panel opens and allows you to determine if you want to download and install updates to the Webroot software when available Protection update options Automatically download and install security protection updates recommended Notify me before downloading and installing security protection updates If selected updates to the security definitions download and install to your computer automatically 1f available when your computer is connected to the Internet If selected updates do not download and install to your computer automatically Instead a notification panel opens and allows you to determine if you want to download and install updates to the security definitions when available WARN Webroot Automated Research Network program Allow malware data to be sent to Webroot anonymously If selected allows the software to gather information during scans and shielding activities including spyware viruses and potential threats that are not yet classified then send the data to Webroot WARN is a global community of individuals and businesses who provide Webroot with sample items detected on their computer to help us identify and fight emerging threats Note The Webroot software does not gather personal information with the WARN pr
40. finitions a set of fingerprints that characterize potential threats When it detects items it takes one of the following actions For definite threats positive matches with security definitions the System Scanner removes the items from their current locations and sends them to a holding area called Quarantine where they are rendered inoperable and cannot cause any harm For programs that are classified as potentially unwanted applications the System Scanner opens a notification about what it found You can decide whether to send the item to Quarantine or ignore it For viruses the System Scanner removes the infected portions ofthe file during a cleaning process It keeps the cleaned file in its original location and sends a copy of the corrupted file to Quarantine The System Scanner is preconfigured to scan your computer automatically at optimal times without disrupting your work You can also disable automated scanning and run the System Scanner manually To use the System Scanner see the following topics Scanning for threats on page 14 e Viewing scan details on page 16 e Customizing scan options on page 19 e Creating a scan schedule on page 21 2 Security Scans 13 Scanning for threats Although the System Scanner is preconfigured for automated scanning you can run an immediate scan yourself at any time You can start a scan from the Webroot software s main interface from the system
41. g to trick you They display scary messages such as Warning A Virus was Found on your Computer Buy SomeSoftware now and have buttons and icons that look like actual Windows graphics Some of these fake messages are trying to lure you to another Web site where they will ask for your credit card number or other personal information Others are advertisements designed to look like fake Windows dialogs look for grayed out text that says advertisement displayed in a bottom corner The most evil aspect of these fake messages is that if you click anywhere in the dialog box even on the No or Close button you will execute its intended actions such as launching malware or sending you to a rogue Internet site The best way to remove a fake message from your screen is to press Alt F4 hold down the Alt button while pressing the F4 key C Frequently Asked Questions 63 But rest assured even if you accidentally click on a fake dialog the Webroot software blocks any malware disables it and sends it to Quarantine Do I need shields if a firewall is running Yes you should keep both the firewall and the Webroot Shields enabled since they are using different methods to locate different types of threats The firewall looks for unrecognized communications over the computer ports such as activity that may indicate hacking attempts Shields look for specific programs and files that match Webroot s threat definitions such as spyware and v
42. gs using one of the following methods Methods for defining proxy settings Use Internet Explorer settings If you want to use values already defined in Internet Explorer click the Import from Internet Explorer button Use your own settings You can enter the proxy information as follows Proxy server Enter the fully qualified domain name of the server for example proxy company com Port Enter the port number the server uses Username and Password Enter the username and password for the server if used Basic authentication If the server uses another form of authentication besides basic Windows authentication deselect the checkbox Note For further information about your proxy environment contact your proxy server s administrator 6 When you re done click the Save button 6 Program Settings 53 Changing the language setting When you install the Webroot software it automatically detects the language of your operating system and will use the same language for its own interface If desired you can change the language of the Webroot interface To change the language setting l Open the Webroot main interface by double clicking the Webroot icon in the system tray From the taskbar at the bottom of the Home panel click Settings My Account Settings K Support Notifications The Settings panel opens Click Languages Click the radio button for the desired language and
43. ht enter unannounced snoop around your files and wreck havoc on your applications e After you have surfed networking sites adult entertainment sites free lyrics and music download sites and other high traffic sites Malware writers are constantly re engineering methods to infect computers They commonly target popular Web sites by creating pop up ads that can trick you into clicking on a link or by targeting you for a drive by download where an infection will attempt to silently install on your computer as you view pages e f you accidentally clicked on a suspicious looking pop up advertisement Malware writers use all kinds of tricks to lure you into clicking a link and launching their spyware application e Ifyou frequently download screen savers music games movies or pictures Any time you download items on your computer even legitimate ones you could download malware along with it Spyware commonly piggybacks on downloads and can install on your computer without your knowledge For scanning instructions see Scanning for threats on page 14 What should do with items in Quarantine Once items are moved to Quarantine your safest action is to simply keep them there Items in Quarantine are disabled and cannot harm your computer Keeping items in Quarantine also allows you to test your computer and determine if all your programs still work properly after the scan If you discover that some legitimate programs cannot fun
44. ht prevent the Webroot software from intercepting email traffic If this is the case Webroot opens an alert every time an email is sent or received If an alert appears because a firewall application is blocking the Webroot software you need to configure your firewall application to allow the program to monitor the port traffic For more information about resolving communication issues between your firewall application and the Webroot software you can contact Webroot Support or enter the following address into your browser for instructions http www webroot com land personal firewall config php pc 64150 amp rc 1 amp 0oc 110 amp mjv 5 amp mnv 5 amp la ng en amp loc USA amp opi 2 amp omj 5 amp omn 1 If the alert appears only once or just periodically the problem may be due to an inactive network configuration or a non responsive SMTP or POP server at the ISP Internet Service Provider This is a temporary situation The Email Attachments shield should be able to function normally once communication is restored If the message appears frequently when these types of communication errors occur you can select Do not show this message again 38 4 Shields 5 My Account Management Your Webroot account allows you to access some helpful information about your software licenses and other details Your account information is available from My Webroot an online Web area that is accessible at any time For more information see Using
45. ied as a potentially unwanted application and was not moved to Quarantine You can decide to quarantine the item or keep it If the scan launched while the main interface was closed Webroot opens a notification that it completed the scan and found a potentially unwanted application In this case go to the Notifications panel to quarantine or keep the item See Responding to notifications on page 10 Removed The item was deleted before the System Scanner quarantined it This might happen if you are running another security program that removed it or if you manually deleted the file yourself during the scan Any removed items are no longer a threat to your computer Cleaned The item was managed by a virus cleaning process that removed infected portions of the file and restored the cleaned file to your computer in its original location A copy of the corrupted file is now in Quarantine The cleaned file is safe to use the file in Quarantine is not safe to use In addition the following status types can also appear if you managed an item yourself Deleted You deleted the item from the Quarantine panel See Deleting quarantined items on page 25 Restored You restored the item from the Quarantine panel See Restoring quarantined items on page 26 Ignored You ignored a Suspect item in the Scan Complete panel See Scanning for threats on page 14 Details If you don t recognize an item and want to know
46. iewing automated results 61 viewing details 16 when to run an immediate scan 62 schedules for scans 21 stopping with Gamer mode 50 security definitions about 61 updates 49 See how button 5 shields 29 ActiveX shield 31 ADS shield 31 BHO shield 32 Browser Protection shields 33 description of shield protection 29 determining whether to block or allow 63 Email Attachments shield 37 Execution shield 31 Favorites shield 34 File System shield 31 Hosts file shield 36 IE Hijack shield 34 IE Security shield 34 Internet Communication shield 36 Network Protection shield 35 real time active protection 30 responding to alerts 8 Startup Items shield 31 stopping with Gamer mode 50 Tracking Cookies shield 34 using with a firewall 64 Sign In dialog 4 signing in to your account 4 Silverlight updates 48 software updates 49 74 Index Startup Items shield 31 status indicator in system tray 7 subscription expiration 40 42 Support 55 Support tickets creating 43 Suspect status 18 sweeps 13 system history viewing 47 System Scanner 13 actions against threats 15 creating scan schedule 21 customizing scans 19 description of scan process 13 launching from home panel 14 launching from system tray 14 launching from Windows 15 risk levels of items found 17 turning off automated scans 21 viewing details of scan 16 system tray menu 6 T Technical Support 55 third party cookies 63 threats scanning for
47. iption status of your licenses or contact Webroot s US based customer support Contact Information Licenses amp Products Support Web Support Get answers to frequently asked questions search the knowledge base or submit a trouble ticket View web support Call Us 4 Q Speak to someone live in our US based support center Call 1 866 612 4227 Monday Friday Tam 6pm MST Submit a support ticket 4 Ifyou would like to contact Support via email click the Submit a support ticket button A form opens in your browser that you can fill out and submit to Webroot 5 My Account Management 43 44 5 My Account Management 6 Program Settings The Webroot software includes options that allow you to control sweep schedules view history logs and other items related to program activity To manage program settings see the following topics Managing the schedule for scans on page 46 e Viewing the system history on page 47 Managing updates on page 48 Setting Gamer mode on page 50 Using a proxy server on page 52 6 Program Settings 45 Managing the schedule for scans If you have previously created a schedule for scans you can edit delete or run the schedules from the Scheduling panel o Note To create a schedule for scans see Creating a scan schedule on page 21 To manage schedules 1 Open the Webroot main interface by double clicking the Webroot icon in the system tr
48. iruses and stop them before they launch MyAccount FAQs Can install the Webroot software on another computer You can only install the Webroot software on another computer if you purchased a multi user license For more information see Managing licenses and additional products on page 42 Keep in mind that if you install the Webroot software on additional computers these installations will all share a single Webroot account in My Webroot This means that anyone using the other computers can sign in to your online account at http www webroot com mywebroot If you have personal information that you do not want to share in your online account do not provide others with your user name and master password What should do if forget my account password If you forget your original password you can create a new one To reset your password right click the Webroot icon in the system tray and click Sign In from the pop up menu Click the link for Forgot Your Password You must be connected to the Internet webroot Sign In User name email address jolie webroot com Password 2 on this computer s option means that anyone who ess to yc OWS U unt on nputer can oot My Account Ia When the Reset Password page appears enter your email address and click Send Email Webroot sends you an email with instructions for resetting your password 64 C Frequently Asked Questions How do I find my keycode
49. issue 1 Getting Started 7 Responding to alerts If the Webroot software needs to inform you about an important system status it opens a pop up alert in the middle of your computer screen or a balloon alert from the system tray as follows Alert methods Pop up alerts Appear in the middle of the computer screen and require immediate action your computer See Responding to pop up alerts after this table An Browser Helper Object BHO is installing on Always perform the selected action v Show Details Allow Block For your protection Webroot will automatically block installation in 60 seconds Time Remaining 50 seconds Balloon alerts Open from the system tray and may be informational or require Webroot Security x action You have 6 new notifications to view See Responding to balloon alerts on page 9 View Notifications Responding to pop up alerts The Webroot software opens a pop up alert when it detects an item trying to download to your computer and it cannot determine whether this item is a threat or a legitimate program For example the Webroot Shields may open an alert if you are downloading a new toolbar for your browser Toolbars are classified as Browser Helper Objects BHOs and although most BHOs are legitimate some are part of spyware that can download without your knowledge Because Webroot cannot determine if you want this toolbar you need to respond by selecting Allow or Block If
50. mber of hours you want to use Gamer mode before it turns off and switches to regular program operations If you do not want Gamer mode to automatically switch off deselect the checkbox 6 Program Settings 51 Using a proxy server If you use a proxy server to connect to the Internet you must specify information about the proxy connection otherwise Webroot cannot send updates to your computer A proxy server is a computer system or router that acts as a relay between your computer and another server By default the Webroot software is set to communicate directly with your computer and not use a proxy server To specify proxy server settings I Open the Webroot main interface by double clicking the Webroot icon in the system tray From the taskbar at the bottom of the Home panel click Settings My Account Settings Support Notifications The Settings panel opens Click Proxy Settings The Proxy Settings panel opens Settings Support Notifications Proxy Settings Li Proxy settings If you connect to the Internet through a proxy server proxy settings enable you to get Webroot software updates Don use a proxy server e Use custom proxy settings Import from Internet Explorer Proxy server Example proxy company com Port Example 1000 Username Password w Basic authentication Save 4 Select the radio button next to Use custom proxy settings 52 6 Program Settings 5 Define custom settin
51. more about it click View details to the right for a pop up description 18 2 Security Scans Customizing scan options You can change the scan settings to customize the locations where the System Scanner searches for threats and the types of threats it locates To customize scan settings 1 Open the Webroot main interface by double clicking the Webroot icon in the system tray 2 From the Home panel click the Edit settings button under PC Security PC Security Scan now The PC Security panel opens 3 Make sure the Scan tab is selected 4 Select the Use custom scan settings checkbox and click Edit Scan SI Quarantine Scan for viruses spyware and other threats Last scan Scan now View scan details M K 1 Automated scanning oN v The system is taking care of you Leam more about this gt Schedule scans manually The Advanced Scan Settings panel opens Items with a checkmark are enabled and included in the next scan 2 Security Scans 19 Advanced Scan Settings tems I IS I amp I I amp Scan files Choose Reset Save Cancel 5 Select or deselect options by clicking the checkboxes The following table describes each setting 6 When you re done click Save The System Scanner uses these settings for all future scans Advanced scan settings Scan registry items Scans the computer s registry where spyware and other unwanted programs commonly crea
52. nd Security Qu Perform Secure Scan h During the scan the system tray menu provides additional options for pausing or stopping the Scan Home Pause Scan Stop Scan If you want to see scan details click Home The Scan in Progress panel opens see the illustration below this table The Scan in Progress panel shows the items as they are detected Scan in progress Scanning C Documents and Settings All Users VApplicati vqmgr1 dat What we found Status atlas dmt cookie Detected doubleclick cookie Detected HU Sweep status 2 items detected Elapsed time 17 02 Stop scan Pause scan When the scan completes the Webroot software takes one of the following actions For definite threats positive matches with security definitions the System Scanner removes the items from their current locations and sends them to a holding area called Quarantine where they are rendered inoperable and cannot cause any harm The Status changes to Quarantined For more information see Chapter 3 Quarantine on page 23 For viruses the System Scanner removes the infected portions of the file during a cleaning process It keeps the cleaned file in its original location and sends a copy of the corrupted file to Quarantine The status changes to Cleaned For programs that are classified as potentially unwanted applications the System Scanner does not automatically quarantine the items Instead it
53. ndom access memory RAM RAM is the main memory that acts as the computer s workspace for running programs Spyware and other unwanted programs can steal the computer s memory resources which can lead to system crashes slower performance or instability registry A registry is a database of hardware and software settings about your computer s configuration such as the types of programs that are installed Spyware can create entries in the Windows registry which can ultimately slow down your computer and cause problems in your system rootkit A rootkit is a collection of tools that enable administrator level access to a computer or network By using file obfuscation techniques rootkits can hide logins processes files and logs and may include software to capture information from desktops or a network Spyware developers often use rootkits to avoid detection and removal scan A scan is the process of searching for potential threats on your computer such as spyware and viruses then moving those items to Quarantine shields Webroot shields continuously monitor activity related to your Web browser settings network communications between your computer and Web sites Windows system settings Windows Startup programs and email attachments If the shields detect spyware or any other potential threats attempting to download they will either move the item to quarantine or open an alert message that asks you to take action
54. ndows desktop The main interface opens and displays the Home panel which provides access to all functions and notifications for the Webroot software a webroot AntiVirus with Spy Sweeper PC Security e Automated scanning mode BB Full protection enabled Shields are running optimally Edit settings e Last scan 5 12 2010 2 52 PM Get a faster safer computer Upgrade 10f3 B Complete your protection with firewall anb phishing amp system cleanup on lt gt My Account Settings Support Notifications 2 Home panel Status color Green Your computer is secure green yellow or red Yellow A message requires your attention Red A critical item requires your intervention See how button Opens another panel that shows a status of your computer s security Scan now button Launches the System Scanner See Scanning for threats on page 14 Edit settings button Opens another panel where you can change settings for scans See Customizing scan options on page 19 1 Getting Started 5 Home panel continued Help Opens the main Help file My Account Opens the My Account panel where you can view subscription information and access a link for managing your account in My Webroot See Chapter 5 My Account Management on page 39 Settings Opens the Settings panel where you can modify scanning schedules view the system history set program update options set Gamer mo
55. oen un RR eka eee RON pc Ris uU cnr E e m B e RR 55 B Uninstalling the program ssssseeeeen nin BI 57 C Frequently Asked Questions 00 cece eee eee eee 59 Threat protection FAQs 2 2 0 0 2000 ett 60 What is malware and how does it get in my computer 0 0 0 0 ce eee 60 How do know if my computer is infected liliis eee 60 Why does the Windows Security Center say that the Webroot software is turned off 61 Scan and Quarantine FAQS csse ke mue edad iaf i RUR RR UR R DRLR CR E AEG aa Rcg da 61 How do know if the System Scanner found any threats 0 000 e eee eae 61 How does Webroot know the difference between malware and legitimate programs 61 Can work on my computer during a scan lislile ees 61 Can quickly scan a USB or CD liesssseseeeeeee nn 62 Are there times when should run a scan myself 0 0 0 0 0 0 eee ee eee 62 What should do with items in Quarantine liliis 62 What are cookies and why does it find so many llliiillleeeess 62 Shield FAQS ea p 63 How do know if should block or allow a download 0000 eee ee eee 63 A Windows dialog says it found spyware but no Webroot alert appeared What do do 63 Do need shields if a firewall is running llle 64 MyAccount FAQS sep ecri rx dos teens ecw denon s Mag Pee ee B EP en ade aia d deas e RR hae 64 Can install the W
56. ogram 6 Program Settings 49 Setting Gamer mode If the Webroot software s communications over the Internet interfere when you play online games or view movies you can set the program to a silent Gamer mode While in this mode the program does not perform the following activities e Scheduled scans The software does not run scheduled scans when Gamer mode is on When you return the Webroot software to regular operations Gamer mode is switched off it may open an alert that indicates a scheduled scan was missed The missed event does not run automatically Shield functions All shields will be turned off except for the Execution shield which stops executable programs from launching a suspicious process on your computer If the Execution shield detects a potential threat it moves the item to Quarantine without alerting you e Balloon alerts in the system tray Communications with the Webroot server to check for updates To set Gamer mode Do either of the following From the system tray right click on the Webroot icon and select Turn Gamer Mode ON Tum Gamer Mode ON IN Help Launch My Account Sign Out Close OoOr From the main interface click Settings in the bottom taskbar click the Gamer Mode tab then click the button next to Gamer Mode so it displays ON L My Account Settings Support Notifications Gamer Mode By default Gamer mode automatically turns off after four hours
57. on existent Web site The address must be in the following format http www microsoft com If you want to return to the Internet Explorer default pages select the Reset IE page settings to defaults button IE Security shield If a program tries to change your Internet Explorer security settings this shield opens an alert where you can allow or block the change Favorites shield If a spyware program tries to change your Internet Explorer or Firefox list of favorite Web sites this shield opens an alert where you can allow or block the change Tracking Cookies shield If third party cookies attempt to download to your computer this shield blocks them 34 4 Shields Setting network protection Network Protection shields guard your Hosts file stop unexpected Web sites from loading and monitor email attachments To set Network Protection shields 1 Open the Webroot main interface by double clicking the Webroot icon in the system tray 2 From the Home panel click the Edit settings button under PC Security PC Security e The PC Security panel opens 3 Click the Shields tab 4 Click Let me set my options 5 Point your mouse to Network protection and make sure the box to the left is checked Shields Give me recommended protection Let me set my options Shields Options v Real time v Hosts File shield Edit options Pro nas on v Internet Communication shield Email Attachment
58. on page 11 If you have not yet created an account see Creating a Webroot account on page 2 To sign in to your Webroot account 1 Right click the Webroot icon in the system tray and click Sign In from the pop up menu Sign In Close The Sign In dialog opens webroot Sign In User name email address Password Remember me on this computer gt Checking this option means that anyone who lt user nt on can jr protected passwords and synchronized files De 2 Enter your user name your email address and password then click the Sign In button You can now access your online account see Using My Webroot on page 11 o Note If you cannot remember your account password click Forgot Your Password In the dialog that opens enter your email address and click Send Email Webroot sends a message to your email address with instructions for resetting your password 4 1 Getting Started Using the main interface If you want to check on system status or change some settings you can open the Webroot software s main interface by doing either of the following Double click the Webroot icon in the system tray The system tray is located in the lower right corner of your computer screen desktop Open the Windows Start menu click All Programs or Programs click Webroot then click the name of your Webroot software version Double click the Webroot icon on your Wi
59. ond to the same alert again Once you respond to a notification it no longer appears in the Notifications panel and is moved to the History panel under Settings See Viewing the system history on page 47 Using My Webroot My Webroot is your personalized Webroot Web site that is available 24 hours a day every day of the year From My Webroot you can log in to your Webroot account to access your software license status and certain tasks such as upgrading your software and installing it on another computer if you purchased a multi user license You can access My Webroot from any computer Q Note You must create an account to access My Webroot If you have not yet created an account see Creating a Webroot account on page 2 You can open My Webroot by doing either of the following Open your browser and enter https www webroot com mywebroot e Open the main interface double click the Webroot icon in the system tray From the taskbar at bottom of the Home panel click My Account When the My Account panel opens click the Manage My Account button If you are not signed in already My Webroot opens with a Sign In panel on the right as shown below Enter your user name email address and password then click the Sign in button Sign In Username email address Password If you are signed in Webroot bypasses this screen and goes directly to your account 1 Getting Started 11 ER webroot MyAc
60. or updates immediately or to change settings for automatic updates 1 Open the Webroot main interface by double clicking the Webroot icon in the system tray 2 From the taskbar at the bottom of the Home panel click Settings My Account Settings Support Notifications The Settings panel opens 3 Click Updates The Updates panel opens D My Account Settings Support Notifications X Check for updates now Product update options Protection update options WARN program e Automatically download and install Automatically download and install Join Webroot Automated Research product updates recommended security protection updates Network WARN and help fight security recommended threats Notify me before downloading and installing product updates Notify me before downloading and v Allow malware data to be sent to installing security protection updates Webroot anonymously 4 You can click the Check for updates now button to download and install any available updates immediately or you can change the selections for automatic updates which are described in the following table To change an option click the radio button next to the selection 48 6 Program Settings Product update options Automatically download and install product updates recommended If selected updates to the Webroot software download and install to your computer automatically if available when your computer is connected to the Intern
61. ot software while other users have limited access The Webroot software continues its threat protection activities no matter which user is logged into the computer C Frequently Asked Questions 65 66 C Frequently Asked Questions Glossary ActiveX ActiveX technology was developed by Microsoft to allow Web browsers to download and execute programs on your computer ActiveX controls have many legitimate uses such as running animations triggering sounds or downloading Microsoft updates However many spyware programs also use ActiveX to install themselves on your computer If you see an ActiveX alert you should block it from running unless you trust the source of the ActiveX technology adware Adware is a type of software that may display advertisements on your system Some adware may also hijack Web searches meaning it may reroute your Web searches through its own Web page It may change your default home page to a specific Web site Adware generally propagates itself using dialog boxes various social engineering methods or through scripting errors Alternate Data Stream ADS An Alternate Data Stream is a highly technical way to hide images data or code in a file and can be used to hide malicious code The hidden content is impossible to detect using regularly available tools such as Windows Explorer Browser Helper Objects BHOs Browser Helper Objects are add on programs that work with Internet Explorer BHOs
62. ou hear your hard disk actively working when you are not touching your computer Numerous pop up ads open even when you are not connected to the Internet A different home page loads in your browser or strange entries appear in your Favorites and History Strange results appear when you perform an Internet search You can t access certain drives programs Web sites or the printer e Strange messages or images open on your screen or music plays that you did not download Strange icons appear on your desktop or strange programs appear in your start up list 60 C Frequently Asked Questions Why does the Windows Security Center say that the Webroot software is turned off When you start your computer you may see a pop up alert from the Windows Security Center that says your computer is at risk and the Webroot software is turned off similar to the example below o Your computer might be at risk Webroot AntiVirus with Spy Sweeper is turned off Click this balloon to fix this problem Typically this alert appears at Windows startup and occasionally on shutdown due to an overtaxed processor low available system memory or a high number of other startup items present on the system Once the Webroot software has notified the Windows Security Center that it is up and running on your system this alert should automatically close and you can ignore it If the message persists longer than a few minutes contact Webroot Su
63. pport Scan and Quarantine FAQs How do know if the System Scanner found any threats In most cases the Webroot software automatically manages threats for you by disabling them and moving them to Quarantine where they can no longer harm your computer You can view the Quarantine by opening the main interface clicking Edit settings in the PC Security panel and clicking the Quarantine tab If the software detects an item that it classifies as a potential threat or it does not recognize it opens a pop up alert and asks whether you want to accept the item or prevent it from installing on your computer You can also access a summary of Webroot software activity by clicking the arrow next to See how on the Home panel How does Webroot know the difference between malware and legitimate programs When the System Scanner searches your computer it checks installed programs and other items it finds against our database of security definitions These definitions are a set of fingerprints that characterize viruses spyware adware and other types of unwanted items The Webroot Threat Research team constantly updates these definitions to protect your computer from ever changing spyware and other potential threats Webroot automatically downloads these definitions to your computer so you are always protected Can I work on my computer during a scan Yes the System Scanner runs in the background without disrupting your work If automated sc
64. r threats ete ese tne Bacal states sage ete Salle et nci aane nan E 14 Viewing scan detalls 2 22 1 2er dals4opin um Red ace ERR UU RUN RUE Reno E VN RR DIRE Rd es 16 Customizing scan options 0 0 mh 19 Creating a scan schedule 1 0 1 nee eae 21 3 QuaranllG s uea aac e ER E ee ee ee ee ween Ea URN bese RR REM A 23 Viewing quarantined Hems oss eaa cia au maai iiia a aaa hr 24 Deleting quarantined items lilii m mmu 25 Restoring quarantined items 0 00 hh 26 A gt Cni pp emm 29 Setting real time active protection lliliieeee 30 Setting browser protection 0 liliis hh 33 Setting network protection illis mr 35 5 My Account Management 0 00 ee eee enn 39 Viewing account details 0 2 2 0 sls s haha 40 Editing your contact information and password 0 cece tenes 41 Managing licenses and additional products liliis 42 Creating Webroot support tickets 2222s s 43 6 Program SettingS cero E REEF EC ITRE ER AR EG E REFREREETPES BEES 45 Managing the schedule for scans 0 00 cece eee 46 Viewing the system history 0 0 00 ce hrs 47 Managing updates eas eclsdull eria Ia se dia G cage rc da d ecd ru Da ge ida rca Ghia ed 48 Setting Gamer mode 1 6 ehh 50 Using a proxy serVel a os aces Drac Ene Diem Rue Rd Da pack e E VEO eae eed De ee Sa 52 Changing the language setting illie nents 54 A Webroot Support xus pes ue d
65. rantine tab The Quarantine panel displays items that were previously detected during scans and moved to Quarantine You can select an item to see more details in the right pane The following table describes the item details Item Details Name Name of the item currently selected in the list Category Type of item currently selected in the list For more information about types of threats see the Glossary on page 67 Risk rating The red orange bars show the risk level of the selected item The more bars shown the higher the risk Description Description of the item You can view more information about a selected item by clicking View more details online You must be connected to the Internet Once items are stored in Quarantine you can keep them there the recommended action or do one of the following Delete quarantined items permanently If the Quarantine area gets too full Webroot alerts you to remove some items You can permanently delete an item 1f you re sure it s unwanted spyware or another type of threat For instructions see the next section Deleting quarantined items Restore quarantined items If you discover that a legitimate program won t work properly when an item was moved to Quarantine you can restore that item to its original location on the computer For instructions see Restoring quarantined items on page 26 24 3 Quarantine Deleting quarantined items
66. s shield v Browser protection Protects your default home page list of favorites and other browser settings w Network protection Protects your Hosts file s The Options pane displays the shield settings Items with a checkmark are enabled 6 If you want to change a shield setting select the checkbox next to the shield name to disable uncheck or activate check an option The following table describes the function of each Network Protection shield 4 Shields 35 Network Protection shield options Hosts File shield If this shield detects spyware programs attempting to add or change the IP address for a Web site in the Hosts file it opens an alert where you can block or allow the changes See Responding to pop up alerts on page 8 The Hosts file is a Windows file that helps direct your computer to a Web site using Internet Protocol IP addresses Your Web browser uses the IP address to actually connect to a site When you enter a Web address in a browser your computer first looks in the Hosts file to see if it already knows where to go If the domain is listed for example webroot com your computer goes directly to the IP address If the domain is not listed your computer looks up the information from the Internet which is a slightly slower process If you suspect that spyware tampered with the entries in your Hosts file click Edit options The Hosts File Shield Options dialog shows entries that you your
67. scan to ignore For multiple entries use a comma or semicolon to separate entries for example mp3 wma Do not skip dll exe or com file types because malware typically hides in these types of files Enable direct disk Scans for strains of spyware that hide themselves from the Windows scanning including rootkits operating system 20 2 Security Scans Creating a scan schedule The System Scanner is preconfigured to run a scan at optimal times If desired you can disable automated scanning and set your own schedule To create your own scan schedule l Open the Webroot main interface by double clicking the Webroot icon in the system tray From the bottom of the Home panel click Settings in the taskbar My Account Settings Support Notifications The Settings panel opens Click Scheduling My Account Settings Support Automated scheduling Scheduled actions Scan Add action Event Next event 4 4 Turn off scheduled scans by clicking the ON OFF button so the button changes to OFF 5 Automated scheduling Scan Ea In the drop down box make sure Scan is displayed then click the Add action button Automated scheduling Scan OFF Scheduled actions Scan Event Next event The Scheduling panel opens 2 Security Scans 21 9 Perform action every Options Week ty e Webroot recommended settings Custom settings w Monday Saturday Tuesday Sunda
68. ser and enter https www webroot com mywebroot In the Sign In panel enter your user name email address and password then click the Sign in button 2 When My Webroot opens with your account information select MyAccount from the top panel f webroot s The MyAccount page opens It includes all your account information and available tasks For more information see the following sections e Editing your contact information and password on page 41 Managing licenses and additional products on page 42 e Creating Webroot support tickets on page 43 40 5 My Account Management Editing your contact information and password From the Contact Information tab you can enter or change your personal contact information so Webroot can contact you for product update announcements You can also change your Webroot master password from this tab QO Note If you cannot remember your account password open the Sign in screen and click Forgot Your Password In the dialog that opens enter your email address and click Send Email Webroot sends a message to your email address with instructions for resetting your password To edit contact information or change your password 1 Open your browser and enter https www webroot com mywebroot In the Sign In panel enter your user name email address and password then click the Sign in button If you are already signed in this button displays Sign Out 2 When
69. t the bottom taskbar The Notifications panel shows all alerts that require your attention 1 Getting Started 9 Responding to notifications The Notifications panel shows alerts that may require you to take an action Depending on the Issue the notification includes instructions and buttons that guide you to managing and resolving the issue To respond to notifications 1 Open the Notifications panel by doing either of the following From the system tray click the View Notifications link from an alert balloon Webroot Security You have notifications to view View Notifications Or From the main interface s Home panel click Notifications in the bottom taskbar My Account Settings Support Notifications amp The Notifications panel opens 2 Click on an item in the Summary pane to display more information at the right webroot Internet Security Complete My Account Settings Support ite 2 Notifications Information Summary Date A threat was auto quarantined Click the View Quarantine button to go to the Quarantine Page View Quarantine Notification 4 20 2010 12 59 07 PM Update Complete 4 20 2010 12 40 10 PM View Quarantine 3 Read the details description and respond by clicking links or buttons for your desired action 10 1 Getting Started For some types of notifications you can select the checkbox for Always perform the selected action so you do not need to resp
70. t for malicious software which is designed to destroy or harm your computer system such as a virus 68 Glossary POP3 Post Office Protocol 3 is a standard protocol that allows you to receive email and store it in an Internet server Most email applications use POP3 ports Ports are numbers that identify the entry and exit points of your computer Computers divide one physical port connection into thousands of virtual port connections most of which are never used All communications protocols have designated entrance ports to your computer For example traffic sent using HTTP for Web pages generally travels through port 80 Your computer s ports are either open or closed An open port allows any information to flow through it and can make your computer vulnerable to hackers A closed port blocks incoming traffic proxy server A proxy server is a computer system or router that acts as a relay between a client and server Proxy servers are used to help prevent an attacker from invading the private network and are often used in building a firewall Quarantine Quarantine is a holding area for spyware viruses and other potentially unwanted applications during a sweep The quarantine process does not delete items from your computer Rather it renders them inoperable and stores them in a safe place where they cannot cause any harm to your computer Items in quarantine can be deleted or restored to their original locations ra
71. t within one minute Webroot Shields automatically block the download Webroot has already preconfigured the Webroot Shields for you based on our recommended settings You do not need to do anything However if you would like to modify the type of protection shields provide you can change the settings as described in this chapter To manage shield settings see the following topics Setting real time active protection on page 30 Setting browser protection on page 33 e Setting network protection on page 35 4 Shields 29 Setting real time active protection The Real time Active Protection shields monitor your computer settings and activity If these shields detect malware or viruses attempting to launch they block these threats before they can damage your system To set Real time Active Protection shields 1 Open the Webroot main interface by double clicking the Webroot icon in the system tray 2 From the Home panel click the Edit settings button under PC Security PC Security Scan now wies The PC Security panel opens 3 Click the Shields tab 4 Click Let me set my options 5 Point your mouse to Real time active protection and make sure the box to the left is checked Shields Give me recommended protection Let me set my options Shields Options 7v Real time active protection v File System shield Protects Windows system settings and stops ees a threats from launching N v Exec
72. te entries Scan memory Scan cookies Scans the computer s random access memory RAM where spyware and other unwanted programs commonly load into memory Scans for third party cookies that are included in the security definitions Scan files Scans specific drives directories or files Click the Choose button to open a pop up dialog where you can specify areas to scan or ignore Click in the checkboxes to deselect areas you don t want to scan Items with a checkmark are included in the scan items without a checkmark are ignored Click OK when you re done Only new files or files that have been changed Scans only the files that are new or modified from the last scan Enabling this option decreases scan time significantly Include compressed files Skip file types Scans compressed files such as zip rar lzh and cab files where malware can hide You may want to use this option after you have found spyware programs and you want to be sure that you have removed them Enabling this option increases scan time significantly After the first scan with this option the System Scanner skips compressed files that have not changed thereby saving time If you download a compressed file in the future you can scan just that file from Windows Explorer by right clicking on the file and selecting Perform Secure Scan from the pop up menu Scans specified file types only Enter the extensions of file types you want the
73. tions QO Note The Webroot software blocks certain terms in user names such as obscene words If you use a term on our blocked list your account creation may be rejected If you experience problems creating an account contact Webroot Support When you complete the account creation process your account information is provided online through My Webroot which is your personalized Web site available 24 hours a day every day of the year 6 To access My Webroot you can click the Manage My Account button again You can also open a Web browser and enter https www webroot com mywebroot in the address bar When the Sign In dialog opens enter your user name and password QO Note If you did not complete all the steps above or if you did not enter a valid email address account creation will fail If this happens you can complete the process by following steps 1 4 above When a dialog opens that says your account has not been activated click the Activate account button and follow the on screen instructions that open in your Web browser 1 Getting Started 3 Signing in to your Webroot account You can log in to your Webroot account to access software license information and perform certain tasks such as upgrading your software and installing it on another computer if you purchased a multi user license The account is available online 24 hours a day every day of the year from My Webroot see Using My Webroot
74. to All Programs then Webroot then Tools then Uninstall Webroot AntiVirus with Spy Sweeper f Webroot d Internet Explorer Ww MSN le Outlook Express pa Remote Assistance D windows Media Player 8 Windows Messenger Windows Movie Maker All Programs 5 A Webroot dialog opens and begins removing the Webroot software files 2 When the final dialog opens click Finish to restart your computer B Uninstalling the program 57 58 B Uninstalling the program C Frequently Asked Questions This appendix provides a list of frequently asked questions FAQs which are organized by the following topics Threat protection FAQs on page 60 Scan and Quarantine FAQs on page 61 Shield FAQs on page 63 e MyAccount FAQs on page 64 C Frequently Asked Questions 59 Threat protection FAQs What is malware and how does it get in my computer Malware is malicious software that is designed to harm your computer or compromise your privacy If you do not have the Webroot software actively protecting your computer malware can enter your computer through Internet connections open computer ports compromised disks and email attachments Internet connections are the primary source of entry Whenever you connect to the Internet you could provide the outside world with access to your computer and potentially allow in snoops thieves and virus outbreaks Fortunately Webroot blocks any
75. ton displays Sign Out 2 When My Webroot opens with your account information select MyAccount from the top panel CLR webroot LL 3 Click the Licenses amp Products tab Your license information opens similar to the example below MyAccount Access and update your Webroot account record check the subscription status of your licenses or contact Webroot s US based customer support Contact Information Licenses amp Products Support PRODUCT HAME KEY CODE INSTALLED OH EXPIRES Webroot AntiVirus MENU Sep 14 2010 Install Renew with AntiSpyware From this page you can e Click Install to re install your software or install it onto another computer if you have a multi licensed version Click Renew to update your subscription 42 5 My Account Management Creating Webroot support tickets If you have questions or problems you can create a support ticket to send to Webroot or view past tickets To create a support ticket 1 Open your browser and enter https www webroot com mywebroot In the Sign In panel enter your user name email address and password then click the Sign in button If you are already signed in this button displays Sign Out 2 When My Webroot opens with your account information select MyAccount from the top panel LR webroot Your Webroot account information opens 3 Click the Support tab MyAccount Access and update your VYebroot account record check the subscr
76. tray menu or from Windows Explorer Methods for launching a manual scan 1 Open the Webroot main interface by double clicking the Webroot icon in the system tray 2 Click the Scan now button in the PC Security panel To view its progress or to stop the scan The Scan in Progress panel opens You can stop or pause the scan by selecting either the Stop Scan or Pause Scan buttons System tray To run a scan from the system tray menu 1 Open the Webroot main interface by double clicking the Webroot icon in the system tray 2 Click Scan Now The Webroot icon displays a turning dial to indicate it s busy scanning During the scan the system tray menu provides additional options for pausing or stopping the Scan Q Home Pause Scan Stop Scan If you want to see scan details click Home The Scan in Progress panel opens see the illustration below this table Main interface To run a scan from the main interface PC Security QO Home a Scan Now Ie Tum Gamer Mode ON Help Launch My Account Sign Out Close 14 2 Security Scans Methods for launching a manual scan continued Windows To run a scan from Windows Explorer Explorer 1 Open Windows Explorer ie 2 Right click the file folder or drive you want to ncn scan Search From the pop up menu select Perform Secure Scan The system tray icon displays a turning dial to indicate it s busy scanning Sharing a
77. ution shield v Startup Items shield Edit options v Browser protection Protects your def ome page ist of wv ActiveX shield favorites and other browser settings ADS w Network protection v BHO shield Edit options your H s file stops unexpected Wet The Options pane displays the shield settings Items with a checkmark are enabled 6 If you want to change a shield setting select the checkbox next to the shield name to disable uncheck or activate check an option The following table describes the function of each Real time Active Protection shield 30 4 Shields Real time Active Protection shield options File System shield If this shield detects a threat attempting to launch during write and read operations it sends the item to Quarantine Note For read operations the Webroot software can detect most but not all file types Execution shield If this shield detects a suspicious file trying to install or start it sends the item to Quarantine Startup Items shield If this shield detects malware or a virus attempting to add itself to the Windows startup list it opens an alert where you can block or allow the file See Responding to pop up alerts on page 8 If you want to change the list of programs that start with Windows click Edit options The following dialog opens Startup Shield Options Startup Item Executable v ctfmon exe c windowslsystem32ctfmon exe V VMware Tools 4 WebrootTrayApp
78. v VMware User Process c OK Cancel To see more information about a program click the executable name Not all programs provide additional details If you do not want a program to start with Windows deselect its checkbox and click OK Caution Editing Startup Items is for advanced users Windows and other programs may require some listed items and if you remove them your computer may not start properly ActiveX shield If this shield detects ActiveX controls attempting to install on your computer it opens an alert where you can block or allow the installation See Responding to pop up alerts on page 8 ADS shield If this shield detects programs or viruses that attempt to start from an Alternate Data Stream ADS it opens an alert where you can block or allow the installation See Responding to pop up alerts on page 8 4 Shields 31 Real time Active Protection shield options continued BHO shield If a Browser Helper Object BHO tries to install itself it opens an alert where you can block or allow the installation See Responding to pop up alerts on page 8 If you want to change the BHOs that start with Internet Explorer click Edit options A dialog opens and shows a list of the installed BHOs Items with a checkmark start whenever Internet Explorer starts BHO Shield Options Opbons for the BHO Shield um yut whe eselecbng Browser Helper x 1S are occas s deselecting BHOS can
79. y Wednesday Thursday Friday At Midnight Schedule Cancel Under Perform action every determine the scan schedule as follows In the first field click the drop down arrow to select hour day week month or when you log in e Click in the checkboxes to select one or more days of the week Inthe At field click the drop down arrow to select a time of day Under Options you can select a radio button to keep the Webroot recommended settings or choose custom settings For a description of the custom settings see Customizing scan options on page 19 Click the Schedule button The panel shows details of your scheduled scan MM My Account Settings Support Notifications 1 Scheduling Automated scheduling scan Gi Scheduled actions Scan Md Add action Event Next event Scan every week 7 19 2010 12 00 00 AM Edt Run Now Delete If desired you can edit delete or run the schedules from the Scheduling panel by clicking either Edit Run Now or Delete 22 2 Security Scans 3 Quarantine The Webroot Quarantine is a holding area for potential threats Items in Quarantine are rendered inoperable and cannot harm your computer In the quarantine process the System Scanner removes all traces and items associated with threats from their current locations It then disables their operation by scrambling and compressing all associated items so the threats can no longer harm your computer or st
Download Pdf Manuals
Related Search
Related Contents
PARTS LIST OPERATING AND SERVICE MANUAL Models: GGD_ Internet Online Services User Manual Télécharger l`article Technika LCD32-256 User's Manual teliers. - Loft Sportif MB QUART FX1.1000 User's Manual Samsung MP30 User Manual Copyright © All rights reserved.
Failed to retrieve file