Webroot SecureAnywhere User Guide - 101411
Webroot SecureAnywhere User Guide - 101411
Webroot SecureAnywhere User Guide - 101411
for Webroot SecureAnywhere AntiVirus Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete
Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0
Webroot SecureAnywhere User Guide Version 8.0; October, 2011 2011 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is a trademark of Webroot Software, Inc. All other product and company names mentioned may be trademarks or registered trademarks of their respective owners.
Contents
1: Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
Installing the software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Using the main interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Using the system tray menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 Viewing the protection status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 Creating a Webroot account. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8 Using the PC Security site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
2: Scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
About scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 Running an immediate scan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Running a custom scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 Changing the scan schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 Changing scan settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
3: Shields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
About shields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 Changing Realtime shield settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 Changing Behavior shield settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Changing Core System shield settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29 Changing Web Threat shield settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
4: Firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
About the firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 Changing firewall alert settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35 Managing network applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
5: Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39
About quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40 Managing quarantined items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 Managing file detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43 Using antimalware tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45 Saving a threat log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
iii
Logging in to password-managed sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66 Populating fields in web forms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67 Managing login credentials in the Passwords site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69 Tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69 MyIdentity actions panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70 Updating password-managed site information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71 Generating a secure password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74 Importing passwords from other applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76 Setting Password Manager preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 Exporting user names and passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80 Creating Bookmarklets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82
iv
Changing Internet Explorer settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138 Using Secure File Removal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140 Viewing the Cleanup log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142
11:Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147
Saving a scan log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .148 Viewing the protection statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .149 Viewing the execution history. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150 Submitting a file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .151
13:Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159
Setting basic configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .160 Setting self protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .162 Setting access control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .163 Defining proxy settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .164 Setting heuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165 Importing or exporting settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .168
A: Webroot Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169 B: Uninstalling the program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171 C: License agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
vi
1: Getting Started
Webroot SecureAnywhere delivers complete protection against viruses, spyware, and other online threats without slowing down computer performance or disrupting your normal activities. With its fast scans and one-click threat removal, you can rest assured that malware is eliminated quickly and easily. Webroot SecureAnywhere gives you the freedom to surf, share, shop and bank onlineall with the confidence that your computer and your identity will be kept safe. This user guide describes how to use all features and functions of the Webroot SecureAnywhere software, which includes the following versions:
Webroot SecureAnywhere AntiVirus Standard version that provides protection against viruses, spyware, and other threats.
Webroot SecureAnywhere Essentials All the protection of the AntiVirus version, plus: Firewall protection. System cleaner. Identity protection. Backups. Webroot SecureAnywhere Complete All the protection of the AntiVirus version and the Essentials version, plus: Password management.
To get started with Webroot SecureAnywhere, see the following: Installing the software on page 2 Using the main interface on page 5 Creating a Webroot account on page 8 Using the PC Security site on page 10
1: Getting Started
Close all programs that may be open on your computer. Make sure you have the keycode. Your keycode comes in an email message or is listed on the CD sleeve. The keycode is associated only with the Webroot SecureAnywhere software and does not include any information related to your computer or its configuration. Webroot does not use the keycode in any way to track individual use of its products.
2. Start the installation routine either from a CD or from a downloaded file: If you are installing from a CD, insert the CD into the CD drive. An installation dialog opens where you can click a link to begin. If the installation dialog does not open, use Windows Explorer to navigate to your CD drive and double-click the softwares installation file. If you are installing from a downloaded file, navigate to where you downloaded the file in Windows Explorer and double-click the file to start the installation. Click Run to begin.
1: Getting Started
3. Enter your keycode in the field. 4. If desired, you can click Change installation options at the bottom of the dialog to modify these settings: Create a shortcut to Webroot on the desktop. Click the checkbox if you want a shortcut icon on your Windows Desktop for Webroot SecureAnywhere. Randomize the installed filename to bypass certain infections. This option changes the Webroot installation filename to a random name (for example, QrXC251G.exe), which prevents malware from detecting and blocking Webroots installation file. Protect the Webroot files, processes, and memory from modification. This option enables self protection and the CAPTCHA prompts. (CAPTCHA requires you to read distorted text on the screen and enter the text in a field before performing any critical actions.) For more information, see Setting self protection on page 162 and Setting access control on page 163. Click Close when youre done.
1: Getting Started
When the scan completes, the main interface of Webroot SecureAnywhere opens (see Using the main interface on page 5). If it detects any threats, it moves the items to quarantine where they are rendered inoperable and can no longer harm your system or steal data. For more information, see About scans on page 14 and About quarantine on page 40. After the initial scan, Webroot SecureAnywhere automatically scans your computer daily and constantly monitors activity as you surf the Internet. You do not need to launch a scan yourself or schedule scans. Webroot SecureAnywhere does all the work for you in the background. To verify that its running, look for the Webroot icon in the system tray:
If an important message requires your attention, the icon turns yellow or red, and a dialog opens with further details.
1: Getting Started
Open the Windows Start menu, click All Programs (or Programs), Webroot SecureAnywhere, then Webroot SecureAnywhere again.
On the left side of the panel, the main interface includes the following navigation buttons and links:
Navigation buttons and links Overview PC Security Identity & Privacy View your system status. Change options for protecting your computer and for managing quarantined items. Protect sensitive data that may be exposed during your online transactions and automatically fill in user names and passwords. Note: The Identity shield is only available in the Essentials and Complete versions. Password Management is only available in the Complete version. Protect your files by uploading them to Webroots online repository. Note: Backup & Sync is only available in the Essentials and Complete versions. Use tools to manage processes and files, view reports, and submit a file to Webroot Support.
System Tools
1: Getting Started
Navigation buttons and links (continued) My Account Settings Help and Support View your SecureAnywhere account information, check for updates, and renew or upgrade your subscription. Set advanced configuration options, proxy server settings, scan and shield settings, heuristics, and access control. Open a Webroot support ticket.
1: Getting Started
To view details about the current status and settings, open the main interface. Right-click on the Webroot icon from the system tray menu, then click View Status:
If your system is secure, the main interface is green and displays a message that you are protected. If an issue requires your attention, the main interface describes the problem and provides a button for fixing it, as shown in the following example:
For more information about detected threats, see Managing quarantined items on page 41.
1: Getting Started
Your Personal Security Enter a memorable word or number, using a minimum of 6 characters. Code Choose a code that is easy to remember, because youll be asked to enter two characters of it every time you log in. For example, Webroot SecureAnywhere might ask you to enter the third and sixth characters of this code.
1: Getting Started
Security Question
Choose a question from the drop-down list. If you forget details of your login later, youll need to provide the answer to this question to retrieve the information. Type an answer to your security question. The Security Answer is casesensitive.
Security Answer
4. Click Register Now. Webroot SecureAnywhere notifies you that your registration was successful, and sends a confirmation message to the email address you specified. 5. Open your email application. Click the link in the confirmation email message to open the Confirm Registration page. 6. SecureAnywhere requests two randomly selected characters of the security code you specified when you created the account. Type the requested characters and click Confirm Registration Now. The SecureAnywhere website opens, showing the products you purchased. In this example, the user has access to PC Security, Backups, and Passwords. Mobile Security has not yet been activated.
Note: Until you click the link in the confirmation email and validate your account, you wont be able to log in to the Webroot SecureAnywhere website.
1: Getting Started
If desired, you can add keycodes for other Webroot products and other users to your account. 7. Open the drop-down menu by your user name to access account functions:
The PC Security site opens and shows each computer managed in your account. 3. Click on the desired PC.
10
1: Getting Started
A dialog opens that provides license information and status of previous scans on this device.
4. If you want to change the name displayed for your PC, click the Edit link at the top of the dialog. Enter a new name and click the .
5. You can also change the security settings for each PC managed in your account. To change the security setting from the PC Security site, click the drop-down arrow in the Security Setting field, select a new setting from the drop-down menu, and click the .
1: Getting Started
11
By default, Webroot SecureAnywhere uses the settings that you configured in the desktop application (User Configuration). To learn more about the settings, click the button next to the field. A panel opens that describes the type of protection available. To learn more about heuristics, see Setting heuristics on page 165.
12
1: Getting Started
2: Scans
When Webroot SecureAnywhere scans your computer, it searches for spyware, viruses, any other threats that may infect your computer or compromise your privacy. If it detects a known threat, it moves the item to quarantine, where it is rendered inoperable and can no longer run on your computer. The System Scanner is preconfigured to scan your computer daily, without disrupting your work. If you want to change the automatic scanning behavior, see the following topics: About scans on page 14 Running an immediate scan on page 15 Running a custom scan on page 17 Changing the scan schedule on page 19 Changing scan settings on page 21
2: Scans
13
About scans
During a scan, Webroot SecureAnywhere searches all areas of your computer where potential threats can hide, including drives, files, the Windows registry, and system memory. To detect threats, it looks for any items that match our threat definitions, items listed in our online community database, or items that exhibit suspicious behavior. You can check the scan statistics by clicking PC Security, then the Scan tab:
Scans run automatically every day, at about the same time you installed the software. For example, if you installed the software at 8 p.m., Webroot SecureAnywhere always launches a scan around 8 p.m. It will not disrupt your work, nor will it launch while you are gaming or watching a movie. If any threats are removed during scans, Webroot SecureAnywhere will launch a follow-up scan to make sure your system is clean. If desired, you can view scan results for all your Webroot-managed devices in the PC Security site. This Scan Information tab shows the last 10 scans performed.
14
2: Scans
If the main interface is open, click Scan My Computer from the Overview panel.
This launches a Deep scan, which looks for all types of malware in every area of your computer. (You can also run a quick memory scan or a scan on a selected area. For instructions, see Running a custom scan on page 17.)
2: Scans
15
If Webroot SecureAnywhere locates a threat, it displays information about what it found. To remove a threat, make sure its checkbox is selected and click Next to continue.
Threats are moved to quarantine, where they are rendered inoperable. You do not need to delete them or do anything else. If you want to view quarantined items, click PC Security, the Quarantine tab, then the View Quarantine button. For more information, see Managing quarantined items on page 41. When a threat is removed, Webroot SecureAnywhere will launch a follow-up scan to make sure your system is clean.
16
2: Scans
To run a custom scan: 1. Open the main interface (see Using the main interface on page 5). 2. From the main interface, click PC Security. 3. From the Scan tab, click Custom scan.
2: Scans
17
4. In the Customized Scan dialog, select the radio button for the type of scan you want to perform. If you want to select specific files or drives, choose Custom. Then you can either drag/drop files into this dialog or click the Add File/Folder button to select the directories and files you want.
18
2: Scans
4. Make sure the Enable Scheduled Scans checkbox is selected. 5. In the Scan Frequency field, select one of the following options: every day, a day of the week, or when you boot up (turn on your computer). 6. In the Time field, select an approximate time for the scan to launch. Note: The scan will launch when computer resources are available, generally within an hour of the time you select. 7. If you want to change one of the schedule settings, select its checkbox to disable it (uncheck the box) or activate it (check the box). When youre done, click Save.
2: Scans
19
Determines the best time for scanning (based on available Randomize the time of scheduled scans up to one hour system resources) and runs the scan within an hour of the for distributed scanning scheduled time. If you want to force the scan to run at the exact time scheduled, deselect this option. Perform a scheduled Quick Scan instead of a Deep Scan Runs a quick scan of memory. We recommend that you keep this option deselected, so that deep scans run for all types of malware in all locations.
20
2: Scans
4. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When youre done, click Save. The settings are described in the table below.
Scan settings Enable Realtime Master Boot Record (MBR) Scanning Protects your computer against master boot record (MBR) infections. An MBR infection can modify core areas of the system so that they load before the operating system and can infect the computer. We recommend that you keep this option selected. It adds only a small amount of time to the scan. Checks for rootkits and other malicious software hidden on your disk or in protected areas. Spyware developers often use rootkits to avoid detection and removal. We recommend that you keep this option selected. It adds only a small amount of time to the scan.
2: Scans
21
Scan settings (continued) Enable right-click scanning in Windows Explorer Enables an option for scanning the currently selected file or folder in the Windows Explorer right-click menu. This option is helpful if you downloaded a file and want to quickly scan it.
Displays a full list of files as Webroot SecureAnywhere scans each one. If you want to increase scan performance slightly, deselect this option so that file names only update once per second on the panel. Webroot SecureAnywhere will still scan all files, just not take the time to show each one on the screen. Reduces RAM usage in the background by using less memory during scans, but scans will also run a bit slower. Deselect this option to run faster scans and use more memory.
Favor low CPU usage over fast Reduces CPU usage during scans, but scans will also run a bit scanning slower. Deselect this option to run faster scans. Save non-executable file details Saves all file data to the scan log, resulting in a much larger log to scan logs file. Keep this option deselected to save only executable file details to the log. Show the Authenticating Files pop-up when a new file is scanned on-execution. Scan archived files Opens a small dialog whenever you run a program for the first time. Keep this option deselected if you do not want to see this dialog. Scans compressed files in zip, rar, cab, and 7-zip archives.
22
2: Scans
3: Shields
Shields monitor functions related to web browsing and system activity. If a suspicious item tries downloading or running on your computer, the shields automatically block and quarantine the item. For some types of shields, an alert asks if you want to continue the download or block it. Note: If an alert opens and you arent certain whether to allow or block the detected item, your safest action is to block it. The file name is displayed in the alert box. Write down the file name and do an Internet search on that file or contact Webroot support at https://www.webrootanywhere.com/support. If you would like to change the shielding actions, see the following topics: About shields on page 24 Changing Realtime shield settings on page 25 Changing Behavior shield settings on page 27 Changing Core System shield settings on page 29 Changing Web Threat shield settings on page 31
3: Shields
23
About shields
Shields constantly monitor activity while you surf the Internet and while you work on your computer. The shields protect your computer from malware and viruses, as well as settings for your browser and Windows system. Webroot has already preconfigured the shields for you, based on our recommended settings. You do not need to configure any settings yourself. To view the shield status, click PC Security and the Shields tab. A green button indicates the shield is on. We recommend that you keep all shields enabled; however, you can disable a shield by clicking the green button.
Shields run in the background without disrupting your work. If a shield detects an item that it classifies as a potential threat or detects an item it does not recognize, it opens an alert. The alert asks if you want to allow the item to run or you want to block it, similar to the example below:
If you recognize the file name and you are purposely downloading it (for example, you were in the process of downloading a new toolbar for your browser), click Allow to continue. If you were not trying to download anything, you should click Block. As you surf Internet sites, you could be targeted for a drive-by download, where an unwanted program launches and silently installs on your computer as you view pages.
24
3: Shields
4. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When youre done, click the Save button. Note: We recommend that you keep Webroots default settings. If you make changes and decide you want to return to the recommended settings, click the Reset to Defaults button.
3: Shields
25
Automatically block files when Automatically blocks threats and sends them to quarantine. If detected on execution this option is deselected, you must respond to alerts about detected threats. Scan files when written or modified Block threats automatically if no user is logged in Scans any new or modified files that you save to disk. If this option is deselected, it ignores new file installations (however, it will still alert you if a threat tries to launch). Stops threats from executing even when you are logged off. Threats are sent to quarantine without notification.
26
3: Shields
4. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When youre done, click the Save button. Note: We recommend that you keep Webroots default settings. If you make changes and decide you want to return to the recommended settings, click the Reset to Defaults button.
3: Shields
27
Track the behavior of untrusted Watches programs that have not yet been classified as legitimate programs for advanced threat or as malware. removal Automatically perform the Does not prompt you to allow or block a potential threat. recommended action instead of Webroot SecureAnywhere will determine how to manage the showing warning messages item. Warn if untrusted programs attempt low-level system modifications when offline Opens an alert if an unclassified program attempts to make changes to your system when you are offline. (Webroot SecureAnywhere cannot check its online threat database if you are disconnected from the Internet).
28
3: Shields
4. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When youre done, click the Save button. Note: We recommend that you keep Webroots default settings. If you make changes and decide you want to return to the recommended settings, click the Reset to Defaults button.
3: Shields
29
Prevent untrusted programs Stops unclassified programs from changing the kernel memory. from modifying kernel memory The kernel is the central component of most computer operating systems. It acts as a bridge between applications and data processing done at the hardware level. Prevent untrusted programs from modifying system processes Verify the integrity of the LSP chain and other system structures Prevent any program from modifying the HOSTS file Stops unclassified programs from changing the system processes. Monitors the Layered Service Provider (LSP) chain and other system structures to make sure malware does not corrupt them. Stops spyware from attempting to add or change the IP address for a website in the hosts file. It opens an alert where you can block or allow the changes. The hosts file is a Windows file that helps direct your computer to a website using Internet Protocol (IP) addresses.
30
3: Shields
4. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). Note: We recommend that you keep Webroots default settings. If you make changes and decide you want to return to the recommended settings, click the Reset to Defaults button.
3: Shields
31
5. If you want to create a list of websites to always block or always allow, click View Websites. In the dialog (shown below), enter a website name in the field (in the form of www.sitename.com) and click Add Website. In the table, select whether you want to allow this website (click the Allow radio button) or you want to block it (click the Block radio button). When youre done, click Close.
6. When youre done with Web Threat settings, click the Save button.
32
3: Shields
4: Firewall
If you have the Essentials or Complete versions of Webroot SecureAnywhere, you can use the Webroot firewall to monitor data traffic and block potential threats. The Webroot firewall, when used with the your computers built-in Windows firewall, provides thorough protection for your computer system and your security.
Webroot Subscription Information! Firewall protection is available only in the Essentials and Complete versions. To upgrade, see Upgrading or renewing the software on page 156.
The Webroot firewall is already configured with our recommended settings. However, if you would like to change the firewall options, see the following topics: About the firewall on page 34 Changing firewall alert settings on page 35 Managing network applications on page 36
4: Firewall
33
34
4: Firewall
4: Firewall
35
36
4: Firewall
4: Firewall
37
38
4: Firewall
5: Quarantine
The Webroot quarantine is a holding area for potential threats found during scan and shielding activities. Items in quarantine are rendered inoperable and cannot harm your computer. You do not need to delete them, unless you want to conserve disk space. You can also restore items from quarantine, if necessary. To manage file detection and perform some advanced quarantining functions, see the following topics: About quarantine on page 40 Managing quarantined items on page 41 Managing file detection on page 43 Using antimalware tools on page 45 Saving a threat log on page 47
5: Quarantine
39
About quarantine
As Webroot SecureAnywhere scans and shields your computer, it removes all items associated with threats from their current locations. It then disables their operation and moves them to a holding area, called quarantine. While in quarantine, threats can no longer harm your computer or steal your information. Your safest action is to keep items in quarantine until you have a chance to test your computer and determine if all programs still work properly after the scan. If you discover that some legitimate programs cannot function after an item was moved to quarantine, you can restore the item to its original location. To view and manage quarantined items, click PC Security and the Quarantine tab.
40
5: Quarantine
To view and manage items in quarantine: 1. Open the main interface (see Using the main interface on page 5). 2. Click PC Security, then click the Quarantine tab. 3. Click the View Quarantine button.
The Quarantine panel shows the name of the item, its original location, and the date and time it was quarantined.
5: Quarantine
41
4. If you want to delete or restore the item, click in its checkbox to select it. Then do either of the following: If you want to remove the item permanently, click Erase. Be aware that after erasing it, you can never restore the item. If you want to move the item back to its original location, click Restore. When an item is restored, Webroot SecureAnywhere will no longer detect it during scans. If you want the item to be detected again in the future, you can change its detection rules (see Managing file detection on page 43).
42
5: Quarantine
Detection configuration acts as an override to Webroot SecureAnywheres default scanning and shielding behavior. To use Detection Configuration: 1. Open the main interface (see Using the main interface on page 5). 2. Click PC Security, then click the Quarantine tab. 3. Under Detection Configuration, click the Configure button.
5: Quarantine
43
4. You can add executable files to this list. (Executable files typically have an extension of exe, dll, sys, drv, or com.) To add files, click the Add File button. You can also drag and drop a file from Explorer. The file name appears in the Threat column. (If Webroot SecureAnywhere detected other copies of this file with different file names, it only shows the file name that it last detected.) 5. In the right column, select the radio button for either Allow, Block, or Monitor. If you want to clear the list, click the Remove all button.
44
5: Quarantine
To access and use these tools: 1. Open the main interface (see Using the main interface on page 5). 2. Click PC Security, then click the Quarantine tab. 3. Under Antimalware Tools, click the View Tools button.
5: Quarantine
45
Reset screensaver
Reboot in Safe Mode Perform an immediate system reboot Manual Threat Removal
Removal Script
46
5: Quarantine
4. In the dialog, select a folder location for the log and click Save.
5: Quarantine
47
48
5: Quarantine
6: Identity Protection
If you have the Essentials or Complete versions of SecureAnywhere, you can use Identity Protection to safely surf the Internet and enter sensitive data in applications. The Identity shield watches for any suspicious activity that may indicate an outside program is attempting to steal information from your computer. To configure advanced Identity shield protection, see the following topics: About Identity Protection on page 50 Changing Identity shield settings on page 51 Managing protected applications on page 53 Managing protected websites on page 55
Webroot Subscription Information! Identity protection is available only in the Essentials and Complete versions. To upgrade, see Upgrading or renewing the software on page 156.
6: Identity Protection
49
50
6: Identity Protection
4. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When youre done, click the Save button. Note: We recommend that you keep Webroots default settings. If you make changes and decide you want to return to the recommended settings, click the Reset to Defaults button. The settings are described in the table below.
Identity shield settings Look for identity threats online Analyzes websites as you browse the Internet or open links. If the shield detects any malicious content, it blocks the site and opens an alert. Analyze websites for phishing threats Analyzes websites for phishing threats as you browse the Internet or open links. If the shield detects a phishing threat, it blocks the site and opens an alert. Phishing is a fraudulent method used by criminals to steal personal information. Typical scams might include websites designed to resemble legitimate sites, such as PayPal or a banking organization, which trick you into entering your credit card number.
6: Identity Protection
51
Identity shield settings (continued) Verify websites when visited to Analyzes the IP address of each website to determine if it has determine legitimacy been redirected or is on our blacklist. If the shield detects an illegitimate website, it blocks the site and opens an alert. Verify the DNS/IP resolution of websites to detect Man-inthe-Middle attacks Block websites from creating high risk tracking information Looks for servers that could be redirecting you to a malicious website (man-in-the-middle attack). If the shield detects a manin-the-middle attack, it blocks the threat and opens an alert. Blocks third-party cookies from installing on your computer if the cookies originate from malicious tracking websites. Cookies are small bits of text generated by a web server and then stored on your computer for future use. Cookies can contain everything from tracking information to your personal preferences.
Prevent programs from Blocks programs from accessing your login credentials (for accessing protected credentials example, when you type your name and password or when you request a website to remember them). Warn before blocking untrusted Opens an alert any time malware attempts to access data, instead of blocking known malware automatically. (This option is for programs from accessing protected data technical users only; we recommend that you keep this option disabled so the program does not open numerous alerts.) Allow trusted screen capture programs access to protected screen contents Allows you to use legitimate screen capture programs, no matter what content is displayed on your screen.
52
6: Identity Protection
To manage the application list and specify levels of protection: 1. Open the main interface (see Using the main interface on page 5). 2. Click Identity & Privacy. 3. From the Identity Shield tab, click View/Edit Protected Applications.
6: Identity Protection
53
The Protected Applications panel opens. This panel shows the web browsers on your system and any other applications that you run on the computer.
4. In the row for the application you want to modify, click the radio button for Protect, Allow, or Deny. (To include another application in this list, click Add Application, then select an executable file.) 5. When youre done, click Close.
54
6: Identity Protection
When you load a protected website, the Webroot icon in the system tray displays a padlock: If the Identity shield encounters a website that may be a threat, it opens an alert similar to the following example. You can decide whether you want to stay secure (click Block) or continue despite the warning (click Allow).
To manage settings for protected websites: 1. Open the main interface (see Using the main interface on page 5). 2. Click Identity & Privacy. 3. From the Identity Shield tab, click View/Edit Protected Websites.
6: Identity Protection
55
The Protected Websites panel opens. Webroot has already applied protection policies to HTTP/HTTPS websites and some social networking sites. If you add individual websites to this list and select custom security options, Webroot first applies the HTTPS or HTTP policies, then layers your user-defined policies on top.
4. In the Protected Websites table, click in the row for the type of website you want to adjust. To include an individual site, enter the address in the field at the top of the dialog, then click Add Website.
56
6: Identity Protection
5. Adjust the slider for minimum to maximum protection configuration. As an alternative, you can also select the individual protection options by clicking on the green checkmark or red X. (A green checkmark indicates the option is on; a red X indicates the option is off.) When youre done, click Save. Each protection option is described below:
Website protection options Block phishing and known malicious websites Alerts you to phishing sites and other malicious sites listed in our Webroot database. Phishing is a fraudulent method used by criminals to steal personal information. Typical scams might include websites designed to resemble legitimate sites, such as PayPal or a banking organization, which trick you into entering your credit card number. Alerts you if a malicious program attempts to gather personal data from cookies installed on your computer. Cookies are small bits of text generated by a web server and then stored on your computer for future use. Cookies can contain everything from tracking information to your personal preferences. Alerts you if a server is redirecting you to a malicious website (man-in-the-middle attack). This is a method of intercepting communications between two systems and stealing data. Stops keyloggers from recording keystrokes on your computer. Keyloggers may monitor emails, chat room dialogue, instant message dialogue, websites visited, usernames, passwords, programs run, and any other typed entries. They have the ability to run in the background, hiding their presence.
Protect sensitive clipboard data Stops malware programs from capturing clipboard data. The clipboard is a utility that allows you to cut and paste stored data between documents or applications. Protect against URL grabbing attacks Protect browser components from external access Protect against Man-in-theBrowser attacks Hides your web browsing activity from malware that attempts to log the websites you visit. Hides your web browsing activity from malware that attempts to modify your browser with memory injection and other behindthe-scenes attacks. Blocks a malicious toolbar from stealing data. A man-in-thebrowser attack is a Trojan that infects a web browser. It can modify pages and the content of your transactions without being detected. Blocks a browser add-on (browser helper object) from stealing data. While most browser add-ons are legitimate, some can display ads, track your Internet activity, or hijack your home page. Analyzes browser memory to see if code injection is taking place.
6: Identity Protection
57
Website protection options (continued) Protect against screen grabbing Blocks a malicious program from viewing and capturing your attacks screen content. Block suspicious access to browser windows Blocks a malicious program from viewing and capturing data in Windows components.
58
6: Identity Protection
7: Password Management
If you have SecureAnywhere Complete, you can use the Password Manager to automatically log you in to websites that require a user name and password. The Password Manager works from your computer or mobile devices. You can also use the Password Manager to populate fields in web forms, saving you the hassle of manually entering your personal data and credit card number in fields.
Webroot Subscription Information! Password Management is available only in the Complete version. To upgrade, see Upgrading or renewing the software on page 156.
To learn more about how to use the Password Manager, see the following topics: About Password Management on page 60 Storing user names and passwords on page 61 Capturing other login fields on page 64 Logging in to password-managed sites on page 66 Populating fields in web forms on page 67 Managing login credentials in the Passwords site on page 69 Updating password-managed site information on page 71 Generating a secure password on page 74 Importing passwords from other applications on page 76 Setting Password Manager preferences on page 78 Exporting user names and passwords on page 80 Creating Bookmarklets on page 82
7: Password Management
59
You can also access the Password Manager functions through the main interface. Click Identity & Privacy, the Password Management tab, then the Manage My Identity button.
60
7: Password Management
2. Open a website that requires a login, then sign in to that site using your user name and password. (If the site requires more than a user name and password to log in, see Capturing other login fields on page 64.) The Password Manager detects the user name, password, and URL, then prompts you to save the login information from a green toolbar near the top of your browser. 3. From the Webroot prompt, click Save Site.
Note: If the Password Manager cannot capture login credentials using this method, you can define credentials in the Passwords site. See the following section, Defining logins from the Passwords site on page 62. The Add Webroot Site dialog opens with the web address already displayed in the Name field, such as my.bank.com. (The user name, password, and URL have been saved automatically and do not appear on this dialog.)
7: Password Management
61
4. You can specify more information about the site and how you want to access it in the future, as described in the following table:
Add Webroot Site dialog Name Group The web address will be used for the site name, unless you want to change it to something simple, such as My Credit Union. You can define a name for a group or select one from the list (if you already defined groups). By defining a group, you can organize sites by categories in the Passwords site, such as Banking and Shopping. If you do not enter a group, the site is categorized in a Default group.
Make This a Favorite If you access this site frequently, select the checkbox. You can then use the Open all Favorites option from the Passwords site. Require Password Reprompt Click this checkbox if you dont want your password automatically filled in the field; and instead, want to manually enter the password yourself. This setting also requires that you enter your SecureAnywhere master password before editing the site information. If you want to bypass the password prompt and log in automatically, select the checkbox.
AutoLogin
5. Click the Save Site button. The next time you access this website, make sure you are signed in to your SecureAnywhere account. When youre signed in, the Password Manager can automatically fill in the user name and password for you. See Logging in to passwordmanaged sites on page 66.
62
7: Password Management
2. On the far right of the panel, click Add site under MyIdentity actions. 3. At the prompt, click Yes, let me manually add a site. The Add Site dialog opens.
7: Password Management
63
Add Site dialog (continued) URL User name Password Notes Options Enter the URL of the websites login page (for example: http:// www.website.com/login). Enter your login name for the site. Enter your password for the site. Optionally, enter any extra information that might be helpful, such as your PIN number for a bank account. If desired, select any of the following: Show in Favorites. If you access this site frequently, select the checkbox. You can then use the Open all Favorites option from the Passwords site. Reprompt for password. Click this checkbox if you dont want your password automatically filled in the field; and instead, want to manually enter the password yourself. This setting also requires that you enter your SecureAnywhere master password before editing the site information. Automatically fill. Keep this checkbox selected if you want your user name and password automatically filled in when you access the site. Otherwise, de-select this checkbox. Automatically log in. If you want to bypass the password prompt and log in automatically, select the checkbox.
5. Click the Add site button. The next time you access this website, make sure you are signed in to your SecureAnywhere account (click the Webroot icon in your browsers toolbar, then enter your SecureAnywhere user name and password). When youre signed in, the Password Manager can automatically fill in the user name and password for you. See Logging in to password-managed sites on page 66.
2. Open a website that requires a login. 3. Fill in all the fields that you want. 4. From the Webroot drop-down menu, click Save All Entered Data.
64
7: Password Management
The Edit Site Information dialog opens. This dialog shows data that it captured from the site. It captures all the fields it can, even if you did not enter data in those fields.
5. Make any changes that you want, then click OK. The next time you access this website, make sure you are signed in to your SecureAnywhere account (click the Webroot icon in your browsers toolbar, then enter your SecureAnywhere user name and password). The Webroot icon appears at the end of the fields to indicate that the login credentials are stored in the Password Manager. (For drop-down fields, the icon is not shown.)
7: Password Management
65
2. Open a password-managed site that you previously defined (see Storing user names and passwords on page 61). The Password Manager remembers the login credentials for you. The Webroot icon appears at the end of the fields to indicate that the login information is stored in the Password Manager. The user name and password fields are automatically filled in, unless you selected Require Password Reprompt in the Add Webroot Site dialog.
If you defined more than one login for a single website, the Password Manager prompts you to select the desired login credentials. Click the AutoFill button to display the different site names and select from one of them to fill in the fields.
66
7: Password Management
2. From the Webroot drop-down menu, select Fill Forms, then Add Profile.
The Edit Form Fill Profile dialog opens. (If you selected Add Credit Card, only the Credit Card Information and Notes tabs appear in this dialog.)
7: Password Management
67
3. In the Profile Name field, enter a name that defines this profile, such as Personal Info or My Visa. 4. Enter as much information as you want in each field. (Click on the tabs for Personal Information, Contact Information, Credit Card Information, Bank Account Information, Custom Fields, and Notes to move between panels.) The Custom Fields tab can be used to create fields that arent listed in this Form Fill dialog. In Text, enter the text from a field on a web page. In Value, enter the information you want automatically filled into that field. (Multiple lines are allowed, but keep in mind that multiple lines can only be filled into a multi-line text box, not a single-line text box.) If you want to require a SecureAnywhere master password before editing the form fill information, click the checkbox for Require Password Reprompt. 5. When youre done, click OK. You can now use the profile to automatically fill your personal data in web fields. 6. Access a website that requires you to enter personal information into fields (name, address, credit card, and so on). The yellow Password Manager toolbar opens. 7. Click the Fill Form button and select the profile from the pop-up menu. (If you want to fill only specific fields, use your mouse to highlight the fields before you select the Form Fill profile.) If this toolbar does not display, click the drop-down arrow next to the Webroot icon in your browser's toolbar, then select Fill Forms > profile name > Fill Form.
The Password Manager transfers any information that applies to the fields into the web form.
68
7: Password Management
Tabs
Under Passwords, you will see the following tabs: Sites. Edit, open, or delete previously defined sites and groups. Also view your passwords. Favorites. View, edit, and delete sites in your Favorites list. Form Fill profiles. View, edit, and delete Form Fill profiles. Passwords. View, edit, and delete secure passwords generated by the Password Manager.
The icons in these panels indicate if the site has an associated note ( ), is a Favorite ( ), requires a password reprompt ( ), or will auto-login ( ). Click Edit next to a site name to add a note and to designate a Favorite, password reprompt, or auto-login.
7: Password Management
69
View deleted items View and recover any groups or sites you previously deleted. View history View Never list View a list of tasks you performed with the Password Manager. Suppress the toolbar prompts for specific websites. In the dialog, select the type of prompts to suppress and enter the websites where you do not want to see those prompts. Create Bookmarklets, which help you access your data if you are traveling, have a mobile browser, or are not using Internet Explorer or Firefox. For instructions, see Creating Bookmarklets on page 82. Import data from another password-management application. For instructions, see Importing passwords from other applications on page 76. Copy your user names and passwords into an Excel spreadsheet. For instructions, see Exporting user names and passwords on page 80.
70
7: Password Management
2. Access the site you want to edit. 3. From the Webroot drop-down menu, select the site name at the bottom, then click Edit.
The Edit Site Information dialog opens. (Depending on what information you originally defined for the site, this dialog may display different fields.)
7: Password Management
71
The fields are described in the following table. 5. When youre done, click OK.
Edit Site Information dialog URL Name Group User name Password Notes Options The URL of the websites login page, which should not be modified unless the URL has changed. The site name. A group you defined and assigned to this site (if any). Your login name for the site. Your password for the site. Click Show if you want to see the actual password characters. Any extra information about this site, such as a PIN number for your ATM machine at the bank. If desired, select any of the following: Favorite. Select this checkbox if you access this site frequently. You can then use the Open All Favorites feature from the Passwords site. Require Password Reprompt. Click this checkbox if you dont want your password automatically filled in the field; and instead, want to manually enter the password yourself. This setting also requires that you enter your SecureAnywhere master password before editing the site information. Never AutoFill. Select this checkbox if you do not want the fields in the website automatically filled when you access the site. AutoLogin. Select this checkbox if you want to bypass a password prompt and go directly to the web page. If this site includes fields that were captured with Save All Entered Data, the fields appear in this form. (There may also be a link to Edit Form Fields.)
To edit site information from the Passwords site: 1. Log into my.webrootanywhere.com and click Passwords.
2. Locate the row for the site you want to change, then click Edit.
72
7: Password Management
3. Edit this dialog as described in the following table, then click the Save Site button.
Edit Site dialog Name Group URL User name Password Notes Options The site name. A group you defined and assigned to this site (if any). The URL of the websites login page, which should not be modified unless the URL has changed. Your login name for the site. Your password for the site. Any extra information about this site, such as a PIN number for your ATM machine at the bank. If desired, select any of the following: Show in Favorites. Select this checkbox if you access this site frequently. You can then use the Open all Favorites option from the Passwords site. Reprompt for password. Click this checkbox if you dont want your password automatically filled in the field; and instead, want to manually enter the password yourself. This setting also requires that you enter your SecureAnywhere master password before editing the site information. Automatically fill. Keep this checkbox selected if you want your user name and password automatically filled in when you access the site. Otherwise, de-select this checkbox. Automatically log in.Select this checkbox if you want to bypass a password prompt and go directly to the web page.
7: Password Management
73
Edit Site dialog (continued) Edit Fields If this site includes fields that were captured with Save All Entered Data, an Edit Fields button also appears. If you want to modify the information displayed in these fields, click that button to display another dialog:
Modify or enter new information in the fields and click Update Fields. Also, if this website has added more fields since you first saved the site information, click Add Field to create and define information for those new fields.
2. Access a password-protected web page and click inside the password field. The yellow Password Manager toolbar opens. 3. Click Generate from the toolbar. (If this toolbar doesnt appear, click the drop-down arrow next to the Webroot icon, then select Tools > Generate Secure Password.) The Generate Secure Password dialog opens.
74
7: Password Management
4. Click the Accept button to use the randomly generated password shown in the field. (If you are not logged in or you are not accessing a web page with a password field, a Copy button appears instead of the Accept button. Click Copy to copy the password to your clipboard. You can then paste the password into a password field.) Once you click Accept, the new password is filled into the Password and Confirm Password fields in your web page. If you want a different password than the one shown, you have several options: Click Generate to create another password, then click Accept. You can keep clicking Generate until you are satisfied with the password displayed in the field. Click in the Show Advanced Options checkbox to display more options for password generation, select the items you want, then click Generate. You can keep clicking Generate until you are satisfied with the password displayed in the field, then click the Accept button.
7: Password Management
75
2. From the Webroot drop-down menu, click Tools, then Import From.
A list of applications appears in a submenu. 3. In the submenu, select from the list of password-management applications. 4. Follow the on-screen instructions for importing passwords from that application. (Since every password application is unique, the instructions for importing data from each one is also unique.) To import passwords by using the Passwords site: 1. Log into my.webrootanywhere.com and click Passwords.
76
7: Password Management
3. From the dialog, click the arrow next to the Import data from field and select a password management application. Click Continue.
4. Follow the on-screen instructions for importing passwords from that application. (Since every password application is unique, the instructions for importing data from each one is also unique.)
7: Password Management
77
78
7: Password Management
3. Change the preferences, as described in the following table. When youre done, click OK.
Password Manager preferences General Select whether you want to: Disable Insecure (IE or Firefox) Password Manager. When selected, the browsers Password Manager does not prompt you to save passwords. Open New Pages in... Select the current tab, Tabs, or new Windows. Highlight Input boxes. When selected, the Password Manager displays fields in a different color. Automatically Fill Login Information. When selected, the Password Manager fills in login fields with your user name and password. Default Form Fill Profile. Select the Form Fill profile you want to use automatically and select the checkbox if you do not want to overwrite fields that are already filled. Select Notifications in the left panel, then click in the checkboxes for each type of notification you want the Password Manager to open. Select Hotkeys in the left panel, then enter key combinations you want to use for common Password Management tasks. Select Advanced in the left panel, then select any of these advanced functions: Enter the number of seconds to automatically log in to sites. Display a warning before filling insecure forms. Allow Web sites to disable AutoFill (keep the rule for AutoComplete=off). Select number of minutes until the Clipboard is cleared after use. Open a login dialog when you start the browser. Create new Form Fill Profiles automatically. Change the language displayed in all dialog boxes, menus, and prompts. (You must restart the browser.)
7: Password Management
79
2. From the Webroot drop-down menu, click Tools, then Export To.
3. Select one of the export options. A dialog opens that asks for your SecureAnywhere master password. 4. Enter your SecureAnywhere account password and click Sign In. If you selected Webroot CSV File or Webroot Encrypted File, you are prompted for a file name and a directory to store that file. If you selected a browser, our password data will be exported into the browsers built-in password manager. To export data by using the Passwords site: 1. Log into my.webrootanywhere.com and click Passwords.
2. Under MyIdentity actions, click Export data. 3. From the dialog, enter your SecureAnywhere master password and click OK. The Export Data dialog opens, similar to the example below. In this dialog, you can see all the information for your sites, passwords, and Form Fill profiles.
80
7: Password Management
4. Click Save to File or Send to Printer. If you are saving a file, another dialog opens that allows you to select a file format, then click Export Data. If you are printing, your data is saved to an HTML page and another dialog opens where you can select a printer and click OK.
7: Password Management
81
Creating Bookmarklets
If you are not using Internet Explorer or Firefox, you can still use some Password Manager features in other browsers by creating Bookmarklets. These are links that you drag and drop into another browser so you can use automatic logins and form filling. For example, to use Bookmarklets with Chrome, you would drag Bookmarklet links to Chromes Bookmarks Bar, then click on the bookmark to use automatic login. Bookmarklets can be used with Safari, Chrome, Opera, Konqueror, and other browsers. To create Bookmarklets: 1. Log into my.webrootanywhere.com and click Passwords.
2.
82
7: Password Management
3. Click on a tab for the browser you want to use. Instructions for that browser appear in the lower panel. Each browser requires a different set of steps. 4. Follow the instructions to create the Bookmarklets, then click OK. 5. To use the Bookmarklet, go to your browser and click on the bookmark for the Password Manager. The Password Manager either performs the function immediately or opens a dialog with more information.
7: Password Management
83
84
7: Password Management
Webroot Subscription Information! Backup & Sync is available only in the Essentials and Complete versions. To upgrade, see Upgrading or renewing the software on page 156.
85
86
When the download completes, the Backup & Sync panel displays the following:
87
If you have not yet created synchronized folders, the Setup dialog opens as shown below.
88
2. Click Next. 3. When the Select Sync Folders dialog box opens, select the checkbox next to the folders you want synchronized with the online servers, then click Next.
Any files residing in these folders will be copied to your online SecureAnywhere account. If there are more folders that you would like to synchronize, but are not listed in the Setup dialog, see Adding synchronized folders on page 91. You can manage these files in the Webroot File Manager (see Using the Webroot File Manager on page 99) or in the Backups site (see Managing files in the Backups site on page 106). 4. At the final dialog, click Finish. Note: If you installed Webroot SecureAnywhere on additional computers in your household and you want to include their folders in synchronization, see Synchronizing data between multiple computers on page 95. The Backup & Sync Manager immediately begins an upload to the online repository. Depending on the number and size of the synchronized folders, the initial upload may take several minutes, but you can still work on your computer during this process. 5. If you want to see the upload progress, open the Webroot File Manager (from the Backup & Sync panel, click Open File Manager). Click the View menu, and select File Transfer Status. A File Transfer Status panel opens and shows the name, size, priority, and location. If you want to check that your folders and files were successfully synchronized, open Windows Explorer and access the folders you selected in the setup process. A green checkmark appears next to a file or folder to indicate that it is synchronized.
89
You can also check your online account in the Backups site (see Managing files in the Backups site on page 106).
90
91
The Webroot Manage Folders dialog opens and shows your computer in the left column, under This Computer. 3. Click Add Folders from this Computer.
4. When the Select New Folders dialog opens, click in the box next to the folders you want included in synchronization, then click OK. The Manage Folders panel shows your selected folders under This Computer. 5. When youre done selecting folders, click the OK button at the bottom of the Webroot Manage Folders dialog. You must click the OK button for the synchronization to begin. The Backup & Sync Manager begins synchronizing and shows its status at the bottom of the Webroot File Manager.
92
The Webroot Manage Folders dialog opens and shows your computer in the left column, under This Computer. 3. Click on the folder you want to remove, then click the X in the upper right.
93
4. At the prompt, click OK. The Backup & Sync Manager no longer synchronizes this folder. It does not delete the folder from your computer, but it does remove the folder from your SecureAnywhere account.
94
Note: The Webroot File Manager assigns a name to your computer, but you can assign a new name if you like. To do this, click on the Tools menu and click Rename this Computer. Do the same for each of your computers with Webroot SecureAnywhere installed. The new name and icon appear in the left panel.
2. For each computer, create at least one synchronized folder that you plan to use as a shared folder (see Adding synchronized folders on page 91). 3. From the Webroot File Manager on either computer, click Manage Sync Folders.
95
The Webroot Manage Folders dialog opens and shows the computer you are currently using in the left column, under This Computer, and your other computers in the right column. 4. Select a folder that you want to synchronize between the two computers. Click the Sync button under the folder name.
5. In the dialog that opens, select the destination computer and click OK. 6. Click OK at the bottom of Webroot Manage Sync Folders to send the sync request to the other computer.
96
7. From the other computer, look for the Pending Sync Folder message in the system tray. Click on the message to accept the sync request. In the next dialog that opens, click OK to accept the folder location or choose another location. Note: If you select a folder with a name that is identical to a folder on the other computer, the dialog asks if you want to merge the two. During a merge, the Backup & Sync Manager copies the contents in each folder to the other, so they each contain the same files. If the folders contain files with identical names, the Backup & Sync Manager first determines if the contents of the files are identical or different. If the content is identical, it links the files and later synchronizes them if you make a change to one. If the content is different, it keeps both versions and suffixes filenames with (from computer_name).
From now on, whenever you place a file in one of these synchronized folders, the Backup & Sync Manager uploads it to your online account and to the other computers. Be aware that any editing changes you make to these files (additions, modifications, or deletions) are also propagated to the other computers and your SecureAnywhere account. If you have three or more computers with Webroot SecureAnywhere installed on each one, you can synchronize data between them by creating shared folders, as described above.
97
If you want to verify that the file or folder was loaded into your online account, open the Backups site (see Managing files in the Backups site on page 106).
98
The Webroot File Manager opens, similar to the following example. The left panel shows synchronized folders, the Magic Briefcase, the Web Archive, and Deleted Files. If you installed SecureAnywhere on multiple computers, the left panel lists each computer. The right panel shows more detail about whatever you select in the left panel.
99
See the following sections for details about the Webroot File Manager and available commands.
Menus
The File, Edit, View, and Tools menus provide access to Webroot File Manager commands. The Help menu provides access to complete online Help, some FAQs, and the ability to send an error report to Webroot.
Toolbar
The toolbar provides commands for reconfiguring synchronized folders, sending files, sharing folders, and synchronizing a folder to other computers.
100
information, see Copying files to the Web Archive on page 104. Deleted Files. This is a recycle bin for files deleted from your account. You can retrieve files from here, if necessary.
Middle panel
The middle panel shows more detail about an item selected in the folder tree on the left. You can click on a file to open it or right-click to open a pop-up menu of commands (see Commands in the Webroot File Manager on page 101).
Commands
The Webroot File Manager includes many commands, which are available from either the menu bar at the top of the panel or from a pop-up menu that opens when you right-click on an item. (Some commands require that you connect to the Internet.) For a complete list of commands, see the following table.
Commands in the Webroot File Manager New Folder Creates a new subfolder in your synchronized folders. To create a subfolder: 1. Select a parent folder from the left panel. 2. Select New Folder either from the File menu or from the pop-up menu when you right-click on the folder name. 3. When New Folder appears, enter your own name and press Enter. You can then load files into this folder by using the Import Files command. Opens the Webroot Manage Folders dialog where you can add or remove folders from synchronization. For further instructions, see Managing synchronized folders on page 91. Sends an email to friends with a link to your files. For further instructions, see Sending files to others on page 121. Sends an email to friends with a link to your photo albums. For further instructions, see Sharing photo albums with others on page 118.
101
Commands in the Webroot File Manager (continued) Import Files Imports files into a synchronized folder. To import files: 1. Select a folder from the left panel. 2. Click Import Files either from the File menu or from the pop-up menu when you right-click on the folder name. 3. When the Import dialog opens, select the files (use Ctrl or Shift to pick multiple files) and click Open. The files appear in the Webroot File Manager and are immediately uploaded to the online servers. Imports subfolders into a synchronized folder. To import a folder: 1. Select a parent folder from the left panel. 2. Click Import Folder either from the File menu or from the pop-up menu when you right-click on the folder name. 3. When the Browse dialog opens, select the folder and click OK. The subfolder appears in the left panel. Saves a synchronized file or folder to a different location on your computer. To export or save: 1. Select a file or folder. 2. Click Export/Save As either from the File menu or from the pop-up menu when you right-click on the file or folder name. 3. When the Browse dialog opens, select the folder location and click OK. The file or folder is saved to that other location. Restores a deleted file. For instructions, see Restoring data on page 123.
Import Folder
Export/Save As
Restore
Edit commands (Cut, Allows you to perform editing tasks, similar to the Edit menu in Windows Copy, Paste, Rename, Explorer and other Windows programs. Select All, and Delete) Note: Deleted files are moved to the Deleted Files recycle bin, where you can permanently delete them or restore them. Show in Windows Explorer Opens Windows Explorer and shows the location of the file on your computer. To show the file location in Explorer: 1. Select a file in the middle panel. 2. Click Show in Windows Explorer either from the View menu or from the popup menu when you right-click on the file name. Explorer opens to the files location. Opens the Backups site and shows the location of the file in your Webroot account. To show the file location in the Backups site: 1. Select a file in the middle panel. 2. Click View in My Online Homepage from the pop-up menu when you rightclick on the file name. The Backups site opens in your Internet browser and shows the files location in your online account.
102
Commands in the Webroot File Manager (continued) Versions Allows you to see up to five previous versions of a file that have been uploaded to the online servers. To see file versions: 1. Select a file in the middle panel. 2. Click Versions either from the View menu or from the pop-up menu when you right-click on the file name. To access a previous version, see Retrieving an older version of a file on page 124. Allows you to check the status of file uploads during synchronizations. To see the file transfer status: 1. Select the View menu. 2. Click File Transfer Status. Another panel opens where you can view the progress of uploads and downloads. If necessary, you can move files up in the priority list. Provides the following options: Show file status icons in Windows Explorer. Adjust the file upload speed from low to high. To access these preferences, select the Tools menu, then click Preferences.
Preferences
Rename this Computer Allows you to enter a more descriptive name and icon for the computers listed in the left panel. To rename a computer: 1. Select one of the computers in the left panel. 2. Select the Tools menu. 3. Click Rename this Computer. 4. In the Name Your Computer dialog, enter a new name and click on an icon. The new name and icon appear in the left panel. Remove a Computer Stops synchronizing folders on this computer. (It does not remove the actual folders on your computer.) To remove a computer from synchronization: 1. Select the computer in the left panel. 2. Select the Tools menu. 3. Click Remove a Computer. 4. In the next dialog, click the Remove button. Any files that were synchronized on this computer are moved from your online account to the Web Archive. If you dont want the files stored there, go to the Web Archive and delete them. If you notice that the total size of the files in the Webroot File Manager does not match how much overall storage space you are using, go to the Tools menu and click Reclaim Storage to make sure all your files are properly accounted for.
Reclaim Storage
103
2. In the Web File Manager, right-click Web Archive to display the pop-up menu, then select either Import Files or Import Folder.
104
3. From the dialog that opens, select the files or folders you want archived. The files are instantly copied to the Web Archive in your online SecureAnywhere account. The Webroot File Manager shows the folders or files under the Web Archive folder. The Status column in the middle panel shows Backed Up next to each file that uploaded successfully. Note: Your files remain in their original location. The Backup & Sync Manager does not move the files, only copies them.
105
The Backups site includes three tabs across the top of the main panel: My Folders and Files, Recent Events, and Photos. These tabs are described in the following sections.
When the New Folder dialog opens, enter a name and a location, then click OK.
106
My Folders and Files (continued) Upload Upload files from your computer to your synchronized folders. To upload files: 1. Select a destination folder in the left panel. 2. Click Upload.
3. When the Upload Files dialog opens, click Browse to select a file to upload from your computer. You can use the additional fields to upload multiple files. 4. When youre done, click OK. Send Files Download Send an email to friends with a link to your files. For further instructions, see Sending files to others on page 121. Access a file from another computer by opening it or by downloading it to a Downloads folder. To download files, see Accessing files remotely on page 110. Copy, move, or delete files. 1. Select one or more files in the middle panel by clicking in the checkbox next to the file name. 2. Click Copy, Move, or Delete.
For Move and Copy, another dialog opens where you select the destination folder. For Delete, files are moved to the Deleted folder, which serves as a recycle bin. Edit with WebSync Edit files from any Internet-connected device and have the changes immediately synchronized. For instructions, see Accessing files remotely on page 110. View previous versions of an uploaded file (five maximum) and restore them if necessary. To see file versions: 1. Click on a file name in the middle panel to display the pop-up menu. 2. Click Versions. A dialog opens with more information about the file and previous versions that were uploaded. For more information about restoring previous versions, see Retrieving an older version of a file on page 124.
Versions
107
My Folders and Files (continued) Rename Rename a file in your synchronized folders. To rename a file: 1. Click on a file name in the middle panel to display the pop-up menu. 2. Click Rename. Enter a new name and press Enter.
Recent Events
In the Recent Events page, you can view the ten most recent activities performed with the Backup & Sync Manager, which may include sharing an album, updating a file, or sending a file.
Photos
The Photos page shows all the synchronized folders that contain at least one JPG file, then displays those folders as photo albums.
108
For a complete list of commands available from the Photos page, see the following table.
Photos My Albums/ Contacts Albums Share Album Publish to Facebook Properties View your own albums or albums sent to you by friends. See Managing photo albums on page 114. Send an email to friends with a link to your photo albums. For instructions, see Sharing photo albums with others on page 118. Publish your photo albums on your Facebook page. For instructions, see Publishing photo albums to Facebook on page 120. Specify who can see the album, rename an album, and view other properties. To set properties: 1. Select the down arrow next to the Actions field beneath the album. 2. Click Properties. From the Properties dialog, you can change the name of the album, view the folder location of the album, or specify whether this album can be viewed by only you, everyone on the Internet, or only selected contacts. Access an album from another computer by opening it or by downloading it to a Downloads folder. For instructions, see Accessing files remotely on page 110.
Download Album
109
The following sections describe: Downloading files Downloading photo albums Editing files remotely
Downloading files
You can download files residing in any of your synchronized folders from any location. For example, if you are traveling and need access to a file located on your home computer, you can download the file from any device with an Internet connection. To download files: 1. Access the Backups site as described above. 2. Make sure the My Folders and Files tab is selected. 3. Do one of the following: Click on a file to display the pop-up menu and select Download. or Select one or more files in the middle panel and click the Download button.
110
A dialog prompts you to open the file or save it to your current computer. 4. Select either: Open with and an application from the drop-down box. If you chose to open the file, the Backup & Sync Manager opens the selected application and loads the file in it. Save File. If you chose to save the file, it creates a Downloads folder (if not already created) and places your files there.
111
A dialog prompts you to open the file or save it to your current computer. 4. Select either: Open with and an application for viewing photos from the Browse button. If you chose to open the album, the Backup & Sync Manager opens the application you selected and loads the album. Save File. If you chose to save the album, the Backup & Sync Manager creates a Downloads folder (if not already created) and places your album there.
112
Note: If a dialog opens that instructs you to install Java, click on the install Java link and follow the on-screen instructions. A dialog prompts you to open the file or save it to your current computer. 4. To edit your file, select Java Web Start Launcher. Your document opens in Microsoft Word, along with a Webroot - WebSync dialog.
5. Edit your file, then click Done With All so your changes are immediately synchronized.
113
3. Click the Photos tab on the far right. The folders containing JPG files are organized into photo albums.
You can perform a number of tasks from the Photos page, as described in the following table.
Photo Album commands My Albums/ Contacts Albums By default, your own albums are shown in the Photos tab. If you want to view photos that friends in your Contacts list sent you, click the Contacts Albums button above the album pictures. (To create a Contacts list, click the Contacts link below the album pictures.) To view your own albums again, click the My Albums button. If you want to reorganize the albums shown in the Photos tab, click the down arrow in the Sort by field to reorganize the albums by name or date imported.
Sort by
114
Photo Album commands (continued) Show/Hide Albums If you want to hide some albums from this view, click the Show/Hide Albums link. In the next panel, click Hide if you do not want this album shown in the Photos tab or Show to display it again. When you hide an album, its files are still synchronized and accessible from your folders.
Actions
Click the drop-down arrow in the Actions field to access the drop-down menu. The menu items are described below. Share Album. Sends an email to friends with a link to your photo albums. For further instructions, see Sharing photo albums with others on page 118. Publish to Facebook. Publishes your photo albums on your Facebook page. For instructions, see Publishing photo albums to Facebook on page 120. Properties. Opens the Properties dialog, where you can change the name of the album, view the folder location of the album, or specify whether this album can be viewed by only you, everyone on the Internet, or only selected contacts. Download Album. Accesses an album from another computer by opening it or by downloading it to a Downloads folder. To download an album, see Accessing files remotely on page 110. If you do not want to receive notifications when someone opens the email with your album attached, click the Settings link below the album pictures. Under Notifications, click Unsubscribe.
Settings
115
Photo Album commands (continued) Contacts If you frequently send albums to the same people, you can create an address list. Click the Contacts link below the album pictures. The Contacts panel opens, similar to the example below.
From this panel, you can create contacts as follows: Add Contact. Click to manually enter a list of friends and family. Add Group. Click to create a group and assign contacts to the group. For example, you may want to create one group that includes only your family and another that includes all your friends. Import Contacts. Click to upload your address book from Gmail, Yahoo, Hotmail, or AOL.
To view all photos within the album, click on the album picture. Another page opens with thumbnail views of your photos. From there, you can click on a thumbnail to view a larger image and access Photo Actions, similar to the example below.
116
The right panel displays a list of commands for album actions (described in the previous table) and for individual photo actions, described in the following table.
Photo Actions View in My Folders and Files Download Photo Rotate Left/ Rotate Right Publish to Facebook Opens the My Folders and Files page and displays the location of the selected photo. Downloads the selected photo (if it resides on another computer). To download a photo, see Accessing files remotely on page 110. Rotates the pictures orientation. Publishes the selected photo on your Facebook page. For instructions, see Publishing photo albums to Facebook on page 120.
You can add descriptions of each photo by selecting Click to add a caption below the photo. The caption appears in the individual photo view and when you click Slideshow in the upper right of the picture.
117
3. Select the Photos tab. 4. Select the drop-down arrow next to Actions, then click Share Album.
118
5. In the To: field, enter the email addresses of the recipients, separated by commas. You can also import email contacts you previously created by selecting Import Contacts in the upper right of the panel. (To create a Contacts list, see Contacts on page 116.) 6. In the Message: field, enter a short message for the invite. (If you select the Make Public... checkbox, your photo album is accessible to anyone on the Internet.) 7. When youre done, click the Share Album button. A status message opens when your file is sent. Your recipients receive a message with a link to your photos. When they click on the link, a web page opens where they can download the files to their computers. (They do not need a SecureAnywhere account.) Recipients are given access to a copy of your photos for 21 days. Since they do not have access to your original files, any future changes you make wont be reflected in their copy. When the recipients access the album, Webroot sends you a notification and logs an entry in the Recent Activity tab in the Backups site. If you do not want to receive notifications, click the Photos tab and click Settings below the album pictures. Under Notifications, click Unsubscribe.
119
3. Select the Photos tab. 4. Click the Facebook icon below the album you want to publish.
5. When the next page opens, you can choose which photos you want published. Click Select All or click on each photo (use Ctrl and Shift), then click the Publish button. 6. In the Facebook dialog, enter your email address and password used for your Facebook account. If the Facebook Special Permissions dialog opens, select Allow Photo Uploads. The following dialog opens:
7. Enter a name for the new album or click Existing Album and select one of your current Facebook albums to load the photos into an existing album. Click OK. A message displays in the Backups site that your pictures are uploading to Facebook. 8. Open your Facebook account and check that your photos are posted on your profile.
120
3. Click the My Folders and Files tab. 4. Select a file by clicking on its checkbox, then click Send Files from the toolbar or Send from the right-click pop-up menu.
121
5. In the To: field, enter the email addresses of the recipients, separated by commas. In the Message: field, enter a short message for the invite. Then click Send. A status message opens when your file is sent. Your recipients receive a message that looks similar to the example below. When they click on the link, a web page opens where they can download the files to their computers. (They do not need a SecureAnywhere account.) Recipients are given access to a copy of your files for 21 days. Since they do not have access to your original files, any future changes you make wont be reflected in their copy.
When the recipients access the files, Webroot sends you a notification and logs an entry in the Recent Activity page of the Backups site.
122
Restoring data
You may need to restore data in the following situations: You need to fully restore all data to a new computer. For example, your old computer crashed, your computer was stolen, or you purchased a new computer and want to quickly load all your old files. See Restoring all data to a new computer, below. You need to retrieve an older version of a file. For example, you accidentally overwrote an important file or you want to revert to an older version of it. See Retrieving an older version of a file on page 124. You need to retrieve a file or folder you deleted. For example, you accidentally deleted a synchronized folder from your computer (which also deleted it from your online account) and you want to restore it. See Retrieving a file or folder you accidentally deleted on page 125. You need to restore data from the Web Archive. For example, you accidentally deleted an important document from your computer, but it was copied to the Web Archive and you want to restore it. See Restoring files from the Web Archive on page 126.
123
3. Make sure the My Folders and Files tab is selected. 4. Select the file you want restored from the middle panel (click in its checkbox). 5. Click on the file name to display the pop-up menu, then click Versions.
A dialog opens with more information about the file and previous versions that were uploaded. 6. Locate an older version and click Save As.
The dialog prompts you to save a copy of the file and give it a new name. 7. Enter a new name or use the Webroot-generated name and click Save. A copy of the file is added to your synchronized folder and is automatically synchronized (copied to both the online folder and your computer). You can access it locally or online.
124
3. Make sure the My Folders and Files tab is selected. 4. Click on the Deleted Files folder. All previously deleted files or folders reside in the Deleted Files folder. 5. Select the file you want restored from the middle panel (click in its checkbox) and click Restore.
6. In the dialog that opens, select a destination and click Restore. The file is moved to the selected folder and synchronized on your computer.
125
5. In the dialog that opens, select the destination for the files and click OK.
126
A web page opens where you can use a credit card to purchase more data storage space.
127
128
9: System Cleaner
If you have the Essentials or Complete versions of Webroot SecureAnywhere, you can use the System Cleaner to remove all traces of your web browsing history, files that show your computer use, and other files that reveal your activity. By removing these items, you can protect your privacy. No one else who has access to your computer can see what websites you have visited or what search terms you have used.
Webroot Subscription Information! System Cleanup is available only in the Essentials and Complete versions. See Upgrading or renewing the software on page 156.
The System Cleaner also removes unnecessary files that consume valuable disk space, such as files in the Recycle Bin or Windows temporary files. To use the System Cleaner, see the following topics: About cleanups on page 130 Running a cleanup on page 131 Changing Windows Desktop settings on page 133 Changing Windows System settings on page 135 Changing Application settings on page 137 Changing Internet Explorer settings on page 138 Using Secure File Removal on page 140 Viewing the Cleanup log on page 142
9: System Cleaner
129
About cleanups
As you work on your computer and browse the Internet, you leave behind traces. These traces may be in the form of temporary files placed on your hard drive, lists of recently used files in programs, lists of recently visited websites, or cookies that websites placed on your hard drive. Anyone who has access to your computer can view what you have done and where you have been. Using the System Cleaner, you can protect your privacy by removing all traces of your activity, including the Internet history, address bar history, Internet temporary files (cache), and cookie files. You can also use the System Cleaner to delete unnecessary files that Windows stores on your computer. Most files are useful, and even required, for your computer to operate properly. However, other files are not necessary and consume valuable space on your hard drive. Even with todays large hard drives, these unnecessary files can impair your computers performance. Note: Cleanups remove unnecessary files and traces, not malware threats. Malware (spyware and viruses) are removed during scans (see About scans on page 14). You can think of the System Cleaner as the housekeeper for your computer, while the Scanner serves as the security guard. The System Cleaner does not run automatically; you need to run it yourself. Before the first cleanup, select all the items you want removed. You can select these items in the Cleanup Settings panel (click System Tools, the System Cleaner tab, then the Cleanup Settings link). Then click the Cleanup Now button to remove the items.
130
9: System Cleaner
Running a cleanup
The System Cleaner permanently removes all items selected in the Cleanup settings. These settings may include your web browsing history, files that show your computer use, and other files that reveal your activity. To check your cleanup options: 1. Open the main interface (see Using the main interface on page 5). 2. Click System Tools, the System Cleaner tab, then the Cleanup Settings link.
9: System Cleaner
131
3. Click each of the categories on the left side of the panel. On the right side, click in the checkboxes to select or deselect items to clean up. Items with a checkmark will be removed. For more information about the settings, see: Changing Windows Desktop settings on page 133 Changing Windows System settings on page 135 Changing Application settings on page 137 Changing Internet Explorer settings on page 138
4. In the System Cleaner Settings panel, select Secure File Removal. By default, file removal is set to Normal, which means items are deleted permanently (bypassing the Recycle Bin). However, data recovery utilities may be able to restore the files. If you want to make sure files can never be recovered, move the slider to Medium or Maximum. See Using Secure File Removal on page 140 for more information. 5. When youre done selecting cleanup settings, click Save, then click Close. 6. From the System Cleaner panel, click the Cleanup Now button. The progress panel shows items as they are removed, along with the space recovered.
132
9: System Cleaner
The System Cleaner Settings panel opens, with Windows Desktop highlighted on the left.
9: System Cleaner
133
3. On the right side, click in the checkboxes to select or deselect items. Items with a checkmark will be cleaned. When youre done, click the Save button. The settings are described in the table below.
Windows Desktop Cleanup options Recycle Bin Removes all files from your Recycle Bin, which contains files you have deleted using Windows Explorer. When you delete a file, it is stored in the Recycle Bin until you empty it. You should periodically empty the Recycle Bin to preserve valuable disk space on your computer. Clears the history of recently opened files, which is accessible from the Windows Start menu. Clears the history of shortcuts to programs that you recently opened using the Start menu. Clears the history of commands that you recently entered into the Run dialog, which is accessible from the Start menu. Note: After the cleanup, you may need to restart your computer to completely remove items from the Run dialog. Clears the history of files or other information that you searched for on your computer. Your computer stores recent searches and displays them when you start entering a new search that starts with the same characters. You access the search (also called find) from Windows Explorer or from your Start button. Reverts the list of programs and documents in the Start menu back to alphabetical order, which is the default setting. After you run the cleanup, you must reboot your system for the list to revert back to alphabetical order.
Search history
134
9: System Cleaner
9: System Cleaner
135
4. On the right side, click in the checkboxes to select or deselect items. Items with a checkmark will be cleaned. When youre done, click the Save button. The settings are described in the table below.
Windows System cleanup options Clipboard contents Windows temp folder Clears the contents from the Clipboard, where Windows stores data when you use either the Copy or Cut function from any Windows program. Deletes all files and folders in the Windows temporary folder, but not files that are in use by an open program. This folder is usually: C:\Windows\Temp. You should not put any files here that you need to keep. The files in this folder can consume a lot of space on your hard drive. Deletes all files and folders in the system temporary folder, but not files that are in use by an open program. This folder is usually in C:\Documents and Settings\[username]\Local Settings\Temp. You should not put any files here that you need to keep. The files in this folder can consume a lot of space on your hard drive. Deletes all files and subfolders in this folder, but not files that are in use by an open program. Windows uses these files when you run Windows Update. After you install the updates, you no longer need these files. These files are normally in C:\Windows\Software\Distribution\Download. You should not put any files here that you need to keep. The files in this folder can consume a lot of space on your hard drive. Clears the history of recent changes you made to the Windows registry. (This option does not delete the registry changes themselves.) Deletes the Windows registry entry that stores the last name used to log on to your computer. When the registry entry is deleted, you must enter your user name each time you turn on or restart your computer. This cleanup option does not affect computers that use the default Welcome screen. Deletes the memory dump file (memory.dmp) that Windows creates when you receive certain Windows errors. The file contains information about what happened when the error occurred. Deletes the Windows project files, created when you use the Windows built-in function to copy files to a CD. These project files are typically stored in one of the following directories: C:\Documents and Settings\[username]\Local Settings\Application Data\Microsoft\CDBurning C:\Users\[username]\AppData\Local\Microsoft\Windows\Burn\Burn Deletes bits of data created by Adobe Flash, which can be a privacy concern because they track user preferences. (Flash cookies are not actually cookies, and are not controlled through the cookie privacy controls in a browser.)
Flash Cookies
136
9: System Cleaner
The System Cleaner Settings panel opens, with Applications highlighted on the left. Applications currently installed on your computer will appear in this panel.
9: System Cleaner
137
3. On the right side, click in the checkboxes to select or deselect applications you want cleaned. The System Cleaner will remove file history traces for applications with a checkmark. 4. When youre done, click the Save button.
The System Cleaner Settings panel opens. 3. On the left side of the panel, click Internet Explorer.
138
9: System Cleaner
4. On the right side, click in the checkboxes to select or deselect items. Items with a checkmark will be cleaned. When youre done, click the Save button. The settings are described in the table below.
Internet Explorer Cleanup Options Address bar history Removes the list of recently visited websites, which is stored as part of Internet Explorers AutoComplete feature. You see this list when you click the arrow on the right side of the Address drop-down list at the top of the Internet Explorer browser. Deletes all cookies from your computer. Cookies are small files that store information about your interaction with a website and may reveal what sites you visited. Be aware that if you remove all cookie files, some websites will not remember you. This means that you may need to re-enter passwords, shopping cart items, and other entries that these cookies stored. Deletes copies of stored web pages that you visited recently. This cache improves performance by helping web pages open faster the next time you visit them, but also reveals your visited sites to other people using your computer and can consume a lot of space on your hard drive. Deletes the list of recently visited websites. You see this list when you click History on the Internet Explorer toolbar. While this history can be helpful, it also reveals your visited sites to other people using your computer. Deletes log files created when you update Internet Explorer. After you install the updates, you no longer need these files.
Cookies
URL history
Setup log
MS download folder Deletes the contents in the folder that stores files you last downloaded using Internet Explorer. After downloading, you no longer need these files. IE MediaPlayer bar Removes the list of audio and video files recently opened with the media player in Internet Explorer, which plays audio and video files that you access on websites.
9: System Cleaner
139
Internet Explorer Cleanup Options Autocomplete form data Deletes data that Internet Explorer stores when you enter information into fields on websites. This is part of Internet Explorers AutoComplete feature, which predicts a word or phrase based on the characters you begin to type (for example, your email address or password). Marks files in the index.dat file for deletion, then clears those files after you reboot the system. The index.dat file is a growing Windows repository of web addresses, search queries, and recently opened files. This option works when you also select one or more of the following options: Cookies, Temporary Internet Files, or URL History. Note: Index.dat functions like an active database. It is only cleaned after you reboot Windows.
140
9: System Cleaner
The Secure File Removal panel opens. By default, file removal is set to Normal, which means items are deleted permanently (bypassing the Recycle Bin). Data recovery utilities may be able to restore the files.
3. If you want to make sure files can never be recovered, move the slider to Medium or Maximum. Medium overwrites files with three passes, whereas Maximum overwrites files with seven passes and cleans the space around the files. Be aware that cleanup operations take longer when moved to Medium or Maximum.
9: System Cleaner
141
The log opens in Notepad and shows a list of files and traces removed.
142
9: System Cleaner
143
4. For each process, you can select the radio button for: Trust: The process is allowed to run on your system. Monitor: Webroot SecureAnywhere will watch the process and open an alert on suspicious activity. Block: The process is blocked from running on your system. Do NOT block a process unless you are absolutely certain it is non-essential.
If you want to terminate all untrusted processes, click Kill Untrusted Processes.
144
4. You can select the file either by clicking the Browse button or by entering the filename and location in the Command-line field. 5. If you want to use some advanced features for controlling how the program is allowed to execute, see the table below. Select a checkbox to disable a function (uncheck the box) or activate it (check the box). When youre done, click the Start button.
SafeStart settings Watch events originating from this process Allow access to the Internet Allow the process to execute other processes Allow access to user resources Opens an event dialog to show a list of events as they take place. Deselect this option if you do not want to see these events. Allows the program to access the Internet. Allows the program to execute subprocesses. Allows the program to access folders in My Documents or active windows within a current session.
Allow access to administrative Allows the program to access system folders, registry entries, locations on the system and other administrative locations.
145
SafeStart settings (continued) Allow access to windows with a High integrity level Allow access to windows with a Medium integrity level Allows the program to access Windows that have been elevated to High through user access control. Allows the program to access Windows that have been elevated to Medium through user access control.
Allow access to network shares Allows the program to access files on a shared network directory.
146
11: Reports
Webroot SecureAnywhere includes reports for scan activity, real-time protection statistics, and process executions. If you discover a particular file that is causing problems on your system, you can submit a file to Webroot for analysis. See the following topics: Saving a scan log on page 148 Viewing the protection statistics on page 149 Viewing the execution history on page 150 Submitting a file on page 151
11: Reports
147
148
11: Reports
11: Reports
149
150
11: Reports
Submitting a file
If a file on your system is causing problems or if you know a file is safe and want it reclassified, you can send the file to Webroot for analysis. To submit a file: 1. From the main interface, click System Tools. 2. Click the Submit a File tab. The following dialog opens.
3. Select the file by clicking the Browse button. 4. Select any of the checkboxes that apply to this file. 5. Enter any additional information in the bottom field. 6. Click Send.
11: Reports
151
152
11: Reports
12: My Account
Your Webroot account includes information about your software licenses and other details. Your account information is available from the My Account panel of the SecureAnywhere program or from my.webrootanywhere.com, which is the online interface. To view or manage account settings from the SecureAnywhere program, see the following topics: About My Account on page 154 Activating a new keycode on page 155 Upgrading or renewing the software on page 156 Checking for software updates on page 157
12: My Account
153
About My Account
The My Account panel shows your keycode, program version number, and the time remaining on your subscription. To view account details, open the main interface and click the My Account link at the bottom left.
154
12: My Account
4. In the dialog, enter the keycode and click the Activate button.
12: My Account
155
The Webroot website opens. From here, you can purchase an upgrade to your software.
156
12: My Account
12: My Account
157
158
12: My Account
13: Settings
To manage program settings, see the following topics: Setting basic configuration on page 160 Setting self protection on page 162 Setting access control on page 163 Defining proxy settings on page 164 Setting heuristics on page 165 Importing or exporting settings on page 168
13: Settings
159
2. To change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When youre done, click Save. The settings are described in the table below.
Basic Configuration settings Show a Webroot shortcut on the desktop Show a system tray icon Provides quick, double-click access to the main interface by placing the shortcut icon on your desktop. Provides quick access to Webroot SecureAnywhere functions by placing the Webroot icon on your desktop:
You can double-click the icon to open the main interface or right-click to open a menu of common functions, like scanning. Show a splash screen on bootup Opens the Webroot splash screen on system startup, which lets you know that the program is running and protecting your computer.
160
13: Settings
Basic Configuration settings (continued) Show Webroot in the Start Menu Lists Webroot SecureAnywhere in the Windows Startup menu items.
Show Webroot in Add/Remove Lists Webroot SecureAnywhere in the Windows Add/Remove Programs Programs panel. Show Webroot in Windows Security Center Hide the Webroot license keycode on-screen Automatically download and apply updates Operate background functions using fewer CPU resources Favor low disk usage over verbose logging (fewer details stored in logs) Lists Webroot SecureAnywhere in the Windows Security Center, under Virus Protection information. Blocks your license keycode from displaying on the My Account panel. Downloads product updates automatically without alerting you. Saves CPU resources by running non-scan related functions in the background. Saves disk resources by saving only the last four log items.
Suppresses Webroot SecureAnywhere functions while you are Lower resource usage when intensive applications or games gaming, watching videos, or using other intensive applications. are detected Allow Webroot to be shut down manually Displays a Shutdown command in the system tray menu. If you deselect this option, the Shutdown command is removed from the menu.
Force non-critical notifications Suppresses information-only messages from appearing in the into the background system tray Fade out warning messages automatically Closes warning dialogs in the system tray after a few seconds. If you disable this option, you must manually click on a message to close it.
Store Execution History details Stores data for the Execution History logs, available under Reports.
13: Settings
161
2. In the Settings panel, click Self Protection. 3. Click a radio button for Minimum, Medium, or Maximum security. Note: If you want to turn off self protection, uncheck the Enable self protection response cloaking box. 4. Click Save.
162
13: Settings
2. In the Settings panel, click Access Control. 3. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When youre done, click Save. Settings are described in the table below.
Access Control settings Enable Password Protection Allow users to scan without a password Allow users to remove threats without a password Require the completion of a CAPTCHA when changing critical features Requires that users enter a password for any configuration changes or critical actions. Allows any user to scan the system, even if password protection is enabled. Allows any user to remove threats, even if password protection is enabled. Opens a CAPTCHA dialog that requires you to read distorted text on the screen and enter the text in a field before performing any critical actions. These actions include changing shields, importing configuration settings, uninstalling the program, and shutting down the agent. Opens a CAPTCHA dialog that requires you to read distorted text on the screen and enter the text in a field before performing any configuration changes.
Allows you to complete configuration changes and critical Remember CAPTCHA completion until the window is functions without re-entering a CAPTCHA test again. Webroot SecureAnywhere will remember your last CAPTCHA until you closed close the main interface. Allow non-administrative users Enables you to modify configuration options, whether you are to modify configuration options logged in as an administrative user or not. Allow uninstallation by nonadministrative users Allow access to antimalware tools by non-administrative users Enables you to uninstall the program, whether you are logged in as an administrative user or not. Enables you to access the Antimalware Tools (under Quarantine), whether you are logged in as an administrative user or not.
13: Settings
163
Access Control settings (continued) Allow access to advanced features by non-administrative users Enables you to access the advanced features, whether you are logged in as an administrative user or not. Advanced features include all options in the Settings panels and the Antimalware tools under Quarantine
3. Enter the proxy settings as described below, then click the Save button.
Proxy settings Proxy Type Authentication Method Select HTTP Proxy from the drop-down box. Select an authentication method form the drop-down box, either Basic, Digest, Negotiate, or NTLM.
164
13: Settings
Proxy settings (continued) Host Port Username Password Enter the fully qualified domain name of the server (for example, proxy.company.com). Enter the port number the server uses. Enter the username for the server, if used. Enter the password for the server, if used.
Setting heuristics
With Heuristics settings, you can adjust the level of threat analysis that Webroot SecureAnywhere performs when scanning your computer. Heuristics can be adjusted for separate areas of your computer, including the local drive, USB drives, the Internet, the network, CD/DVDs, and when your computer is offline. We recommend that you keep Heuristics at their default settings, unless you are an advanced user and understand how changing settings will impact threat detection. Note: If you want to adjust Heuristics settings for all the computers managed in your SecureAnywhere account, go to the PC Security site (see Using the PC Security site on page 10). Webroot SecureAnywhere includes three types of heuristics: Advanced Heuristics. Analyzes new programs for suspicious actions that are typical of malware. Age Heuristics. Analyzes new programs based on the amount of time the program has been in the community. Legitimate programs are generally used in a community for a long time, but malware often has a short lifespan. Popularity Heuristics. Analyzes new programs based on statistics for how often the program is used in the community and how often it changes. Legitimate programs do not change quickly, but malware often mutates at a rapid pace. Malware may install as a unique copy on every computer, making it statistically unpopular.
To change Heuristics settings: 1. Open the main interface (see Using the main interface on page 5). At the bottom left, click Settings.
2. In the Settings panel, click Heuristics. 3. Select the tab for the area you want to change heuristics settings: Local, USB, Internet, Network, CD/DVD, or Offline.
13: Settings
165
4. Select the radio buttons and slide bars to adjust the settings, which are described in the following tables. When youre done, click the Save button.
Radio buttons - additional heuristic options Disable Heuristics Apply advanced heuristics before Age/Popularity heuristics Turns off heuristic analysis. Not recommended. Warns against new programs as well as old programs that exhibit suspicious behavior.
Apply advanced heuristics after Warns against suspicious programs detected with Advanced Age/Popularity heuristics Heuristics, based on Age/Popularity settings. Warn when new programs execute that are not Known Good Warns when malicious, suspicious, or unknown programs try to execute. (This setting may result in false detections.)
Slider - Advanced Heuristics Disabled Turns off Advanced Heuristics for the area selected in the tab, leaving it vulnerable to new threats. (However, it will still be protected against known threats.) Detects programs with a high level of malicious activity. This setting ignores some suspicious behavior and allows most programs to run. Balances detection versus false alarms by using our tuned heuristics in the centralized community database. Protects against a wide range of new threats. Use this setting if you think your system is infected or at very high risk. (This setting may result in false detections.) Provides the highest level of protection against new threats. Use this setting if you think that your system is infected or at very high risk. (This setting may result in false detections.)
Maximum
Slider - Age Heuristics Disabled Low Medium Turns off Age Heuristics for the area selected in the tab, leaving it vulnerable to new threats. (However, it will still be protected against known threats.) Detects programs that have been created or modified very recently. Detects programs that are fairly new and not trusted, preventing zero-day or zero-hour attacks. We recommend using this setting if you do not install unpopular programs and want an extra degree of security to prevent mutating threats. Detects programs that have been created or modified in a relatively short time and are not trusted. This setting is recommended only if you rarely install new programs and if you feel that your system is relatively constant. This setting may generate a higher level of false alarms on more obscure or unpopular programs.
High
166
13: Settings
Slider - Age Heuristics (continued) Maximum Detects all untrusted programs that have been created or modified fairly recently. You should only use this setting if your computer is in a high-risk situation or if you think that it is currently infected.
Slider - Popularity Heuristics Disabled Turns off Popularity Heuristics for the area selected in the tab, leaving it vulnerable to new threats. (However, it will still be protected against known threats.) Detects programs that have been seen for the first time. This setting is recommended if you frequently install new programs, beta programs, or you are a software developer who frequently creates new programs. Detects unpopular and mutating programs, preventing zero-day and zero-hour attacks. This setting is recommended if you do not frequently install new programs and want an extra level of protection over standard settings. Detects programs that a significant percentage of the community has seen. This setting is recommended if you do not install new programs and suspect that your system is infected. Detect programs that a large percentage of the community has seen. This setting is recommended if you think your system is at a very high risk and are willing to accept that you may receive false alarms because of the strict heuristic rules.
Low
Medium
High
Maximum
13: Settings
167
2. From the left panel, click Import/Export. The following panel opens.
3. To transfer your settings to another computer, click Export Settings. Enter a name for the file and click Save. These settings can be from an external hard drive or USB drive. Depending on the file size, this may take a few seconds. 4. Access the other computer and click Import Settings. Select the file and click Save.
168
13: Settings
A: Webroot Support
If you want to open a support ticket with Webroot Support, go to: https://www.webrootanywhere.com/support
A: Webroot Support
169
170
A: Webroot Support
171
172
C: License agreement
The Webroot SecureAnywhere license agreement is available at: http://detail.webrootanywhere.com/eula.asp
C: License agreement
173
174
C: License agreement
Index
A access control settings 163 account activating new keycode 155 adding users and changing settings 10 checking for software updates 157 creating a Webroot account 8 upgrading to new version 156 viewing details in program 154 Active processes 144 Add/Remove programs, showing or hiding SecureAnywhere from 161 address bar history, removing 139 admin account 8 advanced heuristics 166 age heuristics 166 alerts 7 fading out automatically 161 firewall 35 Identity shield 55 remembering responses in 26 setting auto-blocking and quarantine 26 suppressing from system tray 161 antimalware tools 45 applications adjusting threat-detection settings 144 clearing activity traces 137 providing additional security for 53 archived files, including in scans 22 autocomplete form data, clearing 140 AutoFill 66 B backing up files 104 Backup & Sync 85 accessing files remotely 110 accessing previous versions of files 103 adding more storage space 127 adding sync folders 91 configuring sync folders (initial setup) 88 copying files to Web Archive 104 creating Contacts 116 downloading and installing Backup & Sync component 87 downloading files 110 downloading photo albums 111 editing files remotely 112 how it works 86
Backup & Sync (cont) managing photo albums 114 merging data in sync folders 97 publishing photo albums to Facebook 120 reclaiming storage space 103 removing folders from sync 93 renaming computers 103 restoring data to a new computer 123 restoring files from the Web Archive 126 retrieving a deleted file or folder 125 retrieving an older version of a file 124 sending files to friends 121 sharing photo albums 118 stopping synchronization on a computer 103 synchronizing data on multiple devices 95 using the Backups site 106 using the Magic Briefcase 98 using the Web File Manager 99 viewing file transfer status 103 Backups website 106 Basic Configuration 160 Behavior shield 27 BHOs, shielding 57 Bookmarklets in Password Manager 82 browser add-ons, shielding 57 browser requirements 2 browsing, shielding browsing activity 57 C CAPTCHA, enabling or disabling 163 CD burning storage folder, clearing 136 cleanup log 142 cleanups See System Cleaner clipboard contents, clearing 136 clipboard data, shielding 57 compressed files, including in scans 22 cookies blocking third-party cookies from installing 52 protecting against cookie-stealers 57 removing for Internet Explorer browsers 139 Core System shield 29 CPU resources, using fewer 161 cross-site scripting attacks, shielding 32 custom scan 17 D deep scan 17
Index
175
Detection Configuration 43 disabling SecureAnywhere 6 disk space requirements 2 document history, clearing 134 E Edit with WebSync 112 execution history 150 Execution History logs, storing data for 161 F Facebook, publishing photo albums to 120 file detection management 43 Fill Forms 67 firewall 33 changing alert settings 35 enabling or disabling 34 how the firewall works 34 monitoring processes and applications 36 used with Windows firewall 34 full scan 17 G gaming suppressing SecureAnywhere functions 161 turning off scans during games 20 Generate Secure Password 74 H heuristics 165 history, execution 150 Hosts file, shielding 30 I Identity Protection 49 changing shield settings 51 enabling or disabling 50 how it works 50 protected applications 53 protected websites 55 IE MediaPlayer bar, clearing 139 index.dat databases, clearing 140 installing the software 2 Internet Explorer, clearing activity traces 138 Internet requirements 2 K kernal memory, shielding 30 keycode activating new code 155 adding others to your Webroot account 10 hiding from My Account screen 161 installation requirement 2 keyloggers, shielding 57
L license agreement 173 lock icon 53 login credentials shielding 52 storing in Password Manager 61 logon user history, clearing 136 logs cleanup 142 saving resources in logging 161 scan 6, 148 storing data for Execution History 161 LSP chain, shielding 30 M Magic Briefcase folder accessing online 100 using 98 main interface 5 man-in-the-browser attacks, shielding 57 man-in-the-middle attacks, shielding 52, 57 manual threat removal 46 master account 8 Master Boot Record (MBR) scanning 21 memory dump files, clearing 136 MS download folder, clearing 139 My Account 153 activating new keycode 155 checking for software updates 157 upgrading or renewing software 156 viewing details 154 N network applications, monitoring 36 O offline threat protection 26 opening SecureAnywhere 5 P padlock icon 53 Password Manager 59 accessing 60 AutoLogin 72 capturing other types of login fields 64 creating Bookmarklets (using other browsers) 82 creating Favorites 70 creating groups 70 editing managed websites 71 editing Save All Entered Data fields 74 editing saved login credentials 69 exporting to spreadsheet or other file 80 generating a secure password 74 hotkeys for 79
176
Index
Password Manager (cont) how it works 60 importing passwords from other applications 76 logging in to websites 66 modifying notifications for 79 Never AutoFill 72 populating fields in forms 67 require password reprompt 72 setting preferences 78 storing login credentials 61 suppress toolbar prompts 70 using the Passwords site 69 passwords automatically filling 66 enabling for SecureAnywhere configuration functions 163 generating secure passwords for website logins 74 saving in Password Manager 61 Passwords site 69 PC Security site 10 phishing, protecting against 51, 57 popularity heuristics 167 processes adjusting threat-detection settings 144 shielding 30 program settings 159 protected applications 53 protected websites 55 protection statistics 149 proxy server settings 164 Q quarantine 39 antimalware tools 45 auto-quarantine during shielding 26 enabling password for threat removal 163 file detection configuration 43 how it works 40 restoring or deleting items 42 saving threat log 47 viewing items in 41 quick scan 17 R RAM requirements 2 Realtime shield 25 Recycle Bin, clearing 134 registering SecureAnywhere 8 registry streams, clearing 136 removal script 46 removing SecureAnywhere 171 renewing subscription 156
reports 147 execution history 150 protection statistics 149 scan log 148 rootkit detection 21 Run dialog history, clearing 134 S safe mode, rebooting in 46 SafeStart 145 sandbox testing area 145 Save All Entered Data 64 save threat log 47 scan log 6, 148 scanning 13 automatic scanning 14 changing scan settings 21 changing scheduled scan options and behavior 20 checking status from website 11 custom scans 17 enabling password for 163 how scans work 14 launching a scan 15 launching from system tray 6 launching from Windows Explorer 22 managing file detection 43 new or modified files 26 reducing memory and CPU usage 22 results in PC Security website 14 scanning single files or directories 18 threats found 16 screen capture programs, allowing 52 screen grabbers, shielding 58 screensaver, resetting 46 search history, clearing 134 search results, analyzing links for threats 32 Secure File Removal 140 SecureAnywhere website 9 self protection settings 162 settings 159 access control 163 basic configuration 160 defining proxy settings 164 heuristics 165 importing or exporting 168 self protection 162 setup log, clearing 139 shields 23 alerts 24 auto-blocking 26 Behavior shield 27 Core System shield 29 enabling and disabling 24 how shields work 24
Index
177
shields (cont) Identity Protection 51 managing file detection 43 Realtime shield 25 remembering responses in alerts 26 scan new files 26 setting auto-quarantine 26 Web Threat shield 31 shortcut on desktop, adding 160 shredding files 140 shutdown command, hiding from system tray 161 shutting down SecureAnywhere 6 splash screen, showing or hiding on bootup 160 Start menu clearing history 134 showing or hiding SecureAnywhere from 161 starting SecureAnywhere 5 statistics 149 status, viewing 7 submit a file 151 subscription renewal 156 support See Technical Support sync folders adding 91 setting up 88 stopping sync 93 synchronizing on all computers 95 synchronizing files 85 System Cleaner 129 Address bar history 139 Autocomplete form data 140 CD burning storage folder 136 changing application settings 137 changing IE settings 138 changing Windows Desktop settings 133 changing Windows System settings 135 Clipboard contents 136 Default logon user history 136 how it works 130 IE MediaPlayer bar 139 IE URL history 139 index.dat databases 140 Memory dump files 136 MS download folder 139 Recent document history 134 Recycle Bin 134 Registry streams 136 removing IE cookies 139 Run history 134 running a cleanup 131 Search history 134 Secure File Removal 140
System Cleaner (cont) Setup log 139 Start Menu history 134 System temp folder 136 Temporary Internet files 139 viewing cleanup log 142 Windows temp folder 136 System Control 143 active processes 144 using SafeStart sandbox 145 system policies, resetting 46 system requirements 2 system temp folder, clearing 136 system tray menu 6 showing or hiding the Webroot icon 160 T Technical Support opening a support ticket 169 submitting a file to 151 temporary Internet files, clearing 139 threat log 47 threat removal manual 46 scanning 13 threats found during scan 16 tools antimalware 45 enabling access to other users 163 system control 143 tray menu 6 turning off SecureAnywhere 6 U uninstallation enabling access to other users 163 instructions for 171 updating SecureAnywhere enabling or disabling automatic downloads 161 from main interface 157 from system tray 6 upgrading to new version 156 URL grabbing attacks, shielding 57 URL history, clearing for Internet Explorer 139 users, controlling access to SecureAnywhere 163 W wallpaper, resetting 46 warnings See alerts Web Archive accessing online 100 copying files to 104
178
Index
Web Archive (cont) restoring files from 126 Web File Manager 99 Web Threat shield 31 Webroot account 8 Webroot support See Technical Support Webroot website 8 websites analyzing for threats 32 automatically filling in forms with Password Manager 67
websites (cont) automatically storing passwords 61 protecting from malicious content 55 shielding from online identity threats 51 whitelisting 32 WebSync 112 Windows cleaning activity traces 133 clearing operating system traces 135 clearing temp folder 136 system requirements for SecureAnywhere 2 Windows Security Center, showing or hiding SecureAnywhere from 161
Index
179
180
Index