What do I do when Internet Security detects malware?
When Virus Protection is turned on, it automatically scans your computer for malware without asking you any questions. By default, the product immediately handles malware to prevent them from causing harm.
However, if you don’t want the product to handle malware automatically, you can choose to have real-time scanning ask you what you want to do to the malware when it is found. Follow the steps below to enable this option.
- Open the product user interface by clicking the Product icon in the system tray.
- On the Status page, click Settings.
Note: You need administrative rights to change the settings. - On the left navigation panel, select Virus Protection.
- Untick the Handle Harmful Files Automatically checkbox.
- Click OK.
From now on, you can select the option you want based on the type of malware found. See the tables below for more details.
Table 1. Handle Harmful Files |
|
Action to take |
What happens to the file |
Handle automatically |
Let the product decide the best action to take based on the file that was found. |
Clean the files |
The product tries to clean up the files and moves them to the quarantine if they cannot be cleaned. |
Delete the files |
Remove the files from your computer permanently. |
Quarantine the files |
Move the files to the quarantine where they cannot harm your computer. |
Only block the file |
Block access to the file but leave it on your computer. |
Table 2. Handle Spyware |
|
Action to take |
What happens to the spyware |
Handle automatically |
Let the product decide the best action to take based on the spyware that was found. |
Quarantine the application |
Move the application to the quarantine where it cannot harm your computer. |
Remove the application |
Remove the application from your computer permanently. |
Block the application for now |
Block the access to the application but leave it on your computer. |
Always allow the application |
Allow the application to run and exclude it from the scanning in the future. |
Table 3. Handle Potentially Unwanted Applications |
|
Action to take |
What happens to the application |
Quarantine the application |
Move the application to the quarantine where it cannot harm your computer. |
Remove the application |
Remove the application from your computer permanently. |
Block the application for now |
Block the access to the application but leave it on your computer. |
Always allow the application |
Allow the application to run and exclude it from the scanning in the future. |