The Computer module can be found under Setup > Computer. It displays an overview of the protection modules described in the previous chapter. In this section, the following settings are available:

Real-time file system protection

On-demand computer scan

Idle-state scanning

Startup scan

Removable media

Document protection


Scanner options for all protection modules (for example Real-time file system protection, Web access protection, etc.) allow you to enable or disable detection of the following:

Potentially unwanted applications (PUAs) are not necessarily intended to be malicious, but may affect the performance of your computer in a negative way.
Read more about these types of applications in the glossary.

Potentially unsafe applications refers to legitimate commercial software that has the potential to be misused for malicious purposes. Examples of potentially unsafe applications include remote access tools, password-cracking applications, and keyloggers (programs that record each keystroke typed by a user). This option is disabled by default.
Read more about these types of applications in the glossary.

Potentially suspicious applications include programs compressed with packers or protectors. These types of protectors are often exploited by malware authors to evade detection.

Anti-Stealth technology is a sophisticated system that detects dangerous programs such as rootkits which are able to hide themselves from the operating system, making it impossible to detect them using ordinary testing techniques.

Processes exclusions - Allows you to exclude specific processes. For example processes of the backup solution, all file operations attributed to such excluded process are being ignored and considered safe, thus minimizing the interference with the backup process.

Exclusions - Enable you to exclude files and folders from scanning. To ensure that all objects are scanned for threats, we recommend only creating exclusions when it is absolutely necessary. Situations where you may need to exclude an object might include scanning large database entries that would slow your computer during a scan or software that conflicts with the scan.