This site needs to use cookies to function correctly.

Please click the button to accept our cookies. Some may have been set already. Read about our cookies and how to manage them.

Allow Cookies

About Cookies

Cookies are files stored in your browser and are used by most websites to help personalise your web experience.

They enable this website to remember you, either for the duration of your visit using a Session Cookie or for repeat visits using a Persistent Cookie.

Some features on this site will not function if you do not allow cookies.

Our Cookies

We only use "First party cookies" that are set or read by this website.

We do not use "Third party cookies" where your information is passed to other websites, such as where advertising is targeted to you across the web based upon your browsing habits.

Managing Your Cookies

Most web browsers allow some control of most cookies through the browser settings.

To find out more about cookies, including how to see what cookies have been set and how to manage and delete them, visit www.allaboutcookies.org.


Close Up

Managing shields

Shields constantly monitor activity while you surf the Internet and work on your computer. The shields protect your computer from malware and viruses, as well as settings for your browser and the Windows system. SecureAnywhere includes these types of shields:

  • Realtime shield. Controls how threats are blocked and quarantined on your computer.
  • Behavior shield. Blocks applications and processes that exhibit suspicious behavior.
  • Core System shield. Monitors the computer system structures and makes sure malware has not tampered with them.
  • Web Threat shield. Protects your system as you surf the Internet and blocks suspicious files that try to download.
  • USB shield. Monitors an installed USB flash drive for threats and blocks any threats that it finds.
  • Offline shield. Protects your system from threats while your computer is not connected to the Internet.
  • Zero Day shield. Monitors your system for previously unknown vulnerabilities (in which the attack has been known for "zero days").

Shields run in the background without disrupting your work. If a shield detects an item that it classifies as a potential threat or does not recognize, it opens an alert. The alert asks if you want to allow the item to run or if you want to block it. If you recognize the file name and you are purposely downloading it (for example, you were in the process of downloading a new toolbar for your browser), click Allow to continue. If you were not trying to download anything, you should click Block. As you surf Internet sites, you could be targeted for a drive-by download, where an unwanted program launches and silently installs on your computer as you view pages.

The shields are preconfigured, based on our recommended settings. You do not need to configure any settings yourself unless you are an advanced user and would like to modify shield behavior.

To view shield status or to disable shields:

  1. Open SecureAnywhere (see Using the SecureAnywhere interface).
  2. Click the PC Security tab.
  3. Click Shields on the left.

    The Shields panel opens. A green button next to the shield name indicates the shield is on. We recommend that you keep all shields enabled; however, you can disable a shield by clicking the green button.