Managing Detected Threats

If SecureAnywhere detects a threat or suspicious file, it prompts you to manage the item. Follow this procedure on how to manage any threats to your system.

To manage detected threats:

  1. In the Results panel, review the list of file names.

  2. Do either of the following:
    • Keep the checkboxes selected, so items will be moved to quarantine.
    • Deselect any checkbox for which you recognize a filename and know that you need it to run an application.

      For any items you deselect, SecureAnywhere restores them to their original locations.

    Note: Do not restore a file unless you are absolutely sure it is legitimate.

  3. On the bottom right of the window, click the Next button.

    Note: We recommend that you click the Next button to move all items to quarantine, where they are rendered inoperable. If you determine later that you need a file, you can restore it to its original location.

  1. On the Next Steps panel, click the Begin Threat Removal button. SecureAnywhere runs a follow-up scan again to make sure all threat traces are removed. If you cancel the scan, the main panel remains in a Threats Detected state and prompts you to run a scan.