Managing Detected Threats
If SecureAnywhere detects a threat or suspicious file, it prompts you to manage the item. Follow this procedure on how to manage any threats to your system.
To manage detected threats:
- In the Results panel, review the list of file names.
- Do either of the following:
- Keep the checkboxes selected, so items will be moved to quarantine.
- Deselect any checkbox for which you recognize a filename and know that you need it to run an application.
For any items you deselect, SecureAnywhere restores them to their original locations.
Note: Do not restore a file unless you are absolutely sure it is legitimate.
- On the bottom right of the window, click the Next button.
Note: We recommend that you click the Next button to move all items to quarantine, where they are rendered inoperable. If you determine later that you need a file, you can restore it to its original location.
- On the Next Steps panel, click the Begin Threat Removal button. SecureAnywhere runs a follow-up scan again to make sure all threat traces are removed. If you cancel the scan, the main panel remains in a Threats Detected state and prompts you to run a scan.