cancel
Showing results for 
Search instead for 
Did you mean: 

Webroot® SecureAnywhere™ - Antivirus KB

Top Contributors
Sort by:
Android Mobile Cell Device/ Scan Frequency/ Always Up to Date   This is for Webroot SecureAnywhere Mobile Cell Phone. With information to Set a Schedule to Scan. Webroot Android has enhanced protection with definitions that are now fully cloud-based. Definition updates are no longer needed, as they are always up to date.     In the lower right hand corner you will also find a HELP Menu    And for more help go HERE   Thank you!              
View full article
In this article we cover tech support scammers and what you can do to avoid them, or take action to address an encounter you've had with them.
View full article
You can install SecureAnywhere on Mac OS X 10.7 and above. An Internet connection is required to install the software. To install the software:   Click here to download the SecureAnywhere installer to your Mac.   Double-click wsamac.dmg to open the installer.   Drag the Webroot SecureAnywhere icon into the Applications folder.   Open the Applications folder by double-clicking the folder icon.   In the Applications folder, double-click the Webroot SecureAnywhere icon to begin activation.   In the first activation window, select a language from the drop-down box and click Next. Note: Make sure you select the desired language. Once SecureAnywhere installs, you cannot change it.   In the first activation window, enter your keycode and click Activate. Your keycode is the 20-character license that identifies your Webroot account. If you purchased the product online, the keycode is provided in an email from Webroot. If you purchased the product in a store, the keycode is provided in the retail box. In addition, the keycode identifies whether you purchased a multi-user license, which allows you to install SecureAnywhere on up to three or five Macs.   In the next panel, enter your email address and click Continue. (If you don't want to provide your email address, you can click Cancel to skip this step. The installation continues even if you click Cancel.)   If prompted, confirm the installation by entering your Apple system password and click OK.   Now it's time to create your account:   You only need to create an account if you plan to use the Password Management feature (see Getting Started with the Password Manager for more information). Or, you can click Skip and create an account later. If you click Create Account, your browser opens to the SecureAnywhere account creation page. Enter the required information and click Register Now. For more information about account creation, see Creating a Webroot Account.   In the next panel, you can install a Safari extension that allows SecureAnywhere to tag search results as safe, questionable, or unsafe. With this extension, SecureAnywhere lets you know if a website has a reputation for spreading malware or for phishing attempts. We recommended that you click the Install Safari Extension button.   In the Safari dialog, click the Install button.   If you have the Complete or Internet Security Plus editions, Safari asks if you want to install the extension "Webroot," which includes Password Management functions (see Getting started with the Password Manager for more information.Click Install if you want to use the Password Management feature. A dialog opens while the Password Manager is configured to your browser. If you installed both extensions, two Webroot icons appear in the browser toolbar. The example below shows how the icons appear in Safari and Chrome; the icons in Firefox look slightly different. (You can hover your mouse over the icons for pop-up descriptions.)   This icon indicates that the Web Threat shield is enabled. For more information, see Using the Web Threat Shield .   This icon indicates that the Password Management features are enabled. It is grayed-out when you first install the extension. If you have already created an account, you can click on the icon and enter your login credentials to begin using Password Management. See Getting Started with the Password Manager.   When the Activation Successful screen opens, click the Scan Now button. SecureAnywhere begins scanning your Mac for viruses, spyware, and other potential threats. If it detects threats during the scan, it prompts you to move the items to quarantine. In quarantine, the items are rendered inoperable and can no longer harm your system or steal data.   In the Scan Complete window, click Close. The main window opens. After the initial scan, SecureAnywhere automatically scans your Mac daily and constantly monitors activity as you surf the Internet. You do not need to launch a scan yourself or schedule scans. SecureAnywhere does all the work for you in the background. To verify that SecureAnywhere is running, look for the Webroot icon  in your menu bar.
View full article
You can provide additional security for software applications that may contain confidential information, such as Instant Messaging clients or tax preparation software. By protecting these applications, you secure them against information-stealing Trojans like keyloggers, man-in-the-middle attacks, and clipboard stealers. As you work on your computer, SecureAnywhere automatically adds web browsers and applications to the Protected Applications list. It assigns applications to one of these levels of protection: Protect. “Protected applications” are secured against information-stealing malware, but also have full access to data on the system. You might want to add financial management software to the category. When you run a protected application, the Webroot icon in the system tray displays a padlock:   Allow. “Allowed applications” are not secured against information-stealing malware, and also have full access to protected data on the system. Many applications unintentionally access protected screen contents or keyboard data without malicious intent when running in the background. If you trust an application that is currently marked as “Deny,” you can change it to “Allow.”   Deny. “Denied applications” cannot view or capture protected data on the system, but can otherwise run normally. As you work on your computer, SecureAnywhere automatically adds web browsers to the Protected Applications list and assigns them to the “protected” status. To manage the application list and specify levels of protection:   Open SecureAnywhere (see Using the SecureAnywhere interface)   Click the gear icon next to Identity Protection.   Click the Application Protection tab.   In the row for the application you want to modify, click the radio button for Protect, Allow, or Deny. The grey button indicates it is enabled; white is disabled. To include another application in this list, click Add Application, then select an executable file.  
View full article
SecureAnywhere provides tools for manually removing threats and for performing actions associated with threat removal. You should only use these tools if you are an advanced user. These tools allow you to: Target a file for scanning and removal, while also removing its associate registry links (if any).   Launch a removal script with the assistance of Webroot Support.   Reboot after removing a threat yourself or using a removal script.   Reset your wallpaper, screensavers, and system policies. To access and use these tools: Open SecureAnywhere (see Using the SecureAnywhere interface).   Click the gear icon next to Utilities   Make sure the Antimalware Tools tab is selected. The following table describes antimalware options. Antimalware tools Reset desktop wallpaper If your computer was recently infected with malware that changed your wallpaper, click the checkbox and click Run Tools. Reset screensaver If your computer was recently infected with malware that changed your screensaver, click the checkbox and click Run Tools. Reset system policies If your computer was recently infected with malware that changed your system policies, click the checkbox and click Run Tools. Reboot in Safe Mode If Webroot Support instructs you to reboot your computer in Safe Mode, click the checkbox and click Run Tools. Perform an immediate system reboot To reboot your system after threat removal, click the checkbox and click Run Tools. Manual Threat Removal To scan a specific file for threats, click Select a file. In the Windows Explorer dialog, select a file and click Open. SecureAnywhere launches a scan. When it's complete, reboot your system. Removal Script After Webroot Support sends you a removal script, save it to your computer. Click Select Script... to launch the tool.
View full article
Question How can I manage Identity Protection in WSA? Answer Identity Protection protects you from identity theft and financial loss. It ensures that your sensitive data is protected, while safe-guarding you from keyloggers, screen-grabbers, phishing schemes, and other information-stealing techniques. To view the Identity shield status or to disable the Identity shield: Open SecureAnywhere (see Using the SecureAnywhere interface).   Click the gear next to Identity Protection.   The Online Protection pane displays. Identity Protection consists of two shields: the Identity shield and the Phishing shield. The green buttons indicate the shields are on. We recommend that you keep them enabled; however, you can disable them by clicking the green button. You may be prompted to type characters into a CAPTCHA window to confirm you are a real user.
View full article
Question How can I save a threat log? Answer If you want to investigate an infection with Webroot Support, you can save a threat log and send it to Webroot. The threat log shows details about threats removed from your computer. To save a threat log: From the main interface, click PC Security. Click the gear icon next to Utilities, then click the Reports tab.   The system prompts you for a location to save the log, gathers threat data saved since installation to a text file, and displays the file.  
View full article
Question How can I manage file detection in WSA? Answer If you want to control scanning and shielding behavior related to specific files, you can use the Block/Allow Files tab to specify one of the following actions: Allow. Ignore a file during scans and shielding. Block. Stop a file from executing or being written to your computer. Monitor. Watch the program to determine if it is legitimate or related to malware. Block/Allow Files settings override SecureAnywhere’s default scanning and shielding behavior. To block or allow files: Open SecureAnywhere (see Using the SecureAnywhere interface)   Click the gear next to PC Security.   Select the Block/Allow Files tab. Any items that were previously quarantined are listed in the pane.   A filled radio button indicates a selection. You can manually add executable files to this list. (Executable files typically have an extension of exe, dll, sys, drv, or com.) To add files, click the Add File button and browse to the file. You can also drag and drop a file from Explorer. The file name appears in the File column. (If SecureAnywhere detected other copies of this file with different file names, it only shows the file name that it last detected.) In the right column, select the radio button for Allow, Block, or Monitor. If you want to clear all files from the list, click the Remove all button.
View full article
Question How do I manage the firewall? Answer The SecureAnywhere firewall monitors data traffic traveling out of your computer ports. It looks for untrusted processes that try to connect to the Internet and steal your personal information. It works with the Windows firewall, which monitors data traffic coming into your computer. With both the SecureAnywhere and Windows firewall turned on, your data has complete inbound and outbound protection. You should not turn off either the Windows firewall or the SecureAnywhere firewall. If they are disabled, your system is open to many types of threats whenever you connect to the Internet or to a network. These firewalls can block malware, hacking attempts, and other online threats before they can cause damage to your system or compromise your security. The SecureAnywhere firewall is preconfigured to filter traffic on your computer. It works in the background without disrupting your normal activities. If the firewall detects any unrecognized traffic, it opens an alert where you can block the traffic or allow it to proceed. To view firewall status or disable the firewall: Open SecureAnywhere (see Using the SecureAnywhere interface)   The Firewall status shows on the main page under PC Security.   The green button indicates the Firewall is enabled. To disable the firewall, click the white portion of the button. You may be prompted to complete a CAPTCHA screen. SecureAnywhere displays a warning that your Firewall is disabled and recommends you re-enable it.   To enable the Firewall, click Enable Now or the red portion of the Firewall button.  
View full article
Question How can I change firewall alert settings? Answer You can adjust how the firewall manages processes and whether it should open an alert when it does not recognize a process. To change firewall alert settings: Open SecureAnywhere (see Using the SecureAnywhere Interface).   Click Advanced Settings.   Click Firewall on the left. A descriptive list of Firewall settings displays.   Select your settings and click Save.
View full article
Question How do I manage network applications: Answer To protect your computer from hackers and other threats, the firewall monitors processes that attempt to access the Internet. It also monitors the ports used for communicating with the Internet. Advanced users have control over whether SecureAnywhere will allow or block certain processes and port communications. To change settings for active connections: Open SecureAnywhere see: Using the SecureAnywhere Interface   Click the gear icon next to PC Security.   The Scan & Shields panel displays, showing the shields on the right, with the View Active Connections button at the bottom of the list.   Click View Active Connections. The window displays processes with currently active connections to the Internet and the status of your system ports.   Click on a radio button to allow or block a process, or to allow or close a port.
View full article
Question How do the shields work in WSA? Answer Shields constantly monitor activity while you surf the Internet and work on your computer, protecting your computer from malware and viruses. As you surf Internet sites, you could be targeted for a drive-by download, where an unwanted program launches and silently installs on your computer as you view pages.We recommend you keep all shields enabled. Shields run in the background without disrupting your work. If a shield detects an item that it classifies as a potential threat or does not recognize, it opens an alert. The alert asks if you want to allow the item to run or if you want to block it. If you recognize the file name and you are purposely downloading it (for example, you were in the process of downloading a new toolbar for your browser), click Allow to continue. If you were not trying to download anything, you should click Block. SecureAnywhere includes these types of shields: Realtime shield. Monitors unknown programs to determine whether or not they contain threats. Blocks known threats from running on your computer that are listed in Webroot’s threat definitions and in our community database. You should never disable this shield. Rootkit shield. Blocks rootkits from being installed on your computer and removes any that are present. Web shield. Blocks known threats encountered on the Internet and displays a warning. The Web shield maintains information on more than 200 million URLs and IP addresses to comprise the most accurate and comprehensive data available for classifying content and detecting malicious sites. USB shield. Monitors an installed USB flash drive for threats, blocks and removes any threats that it finds. Offline shield. Protects your system from threats while your computer is not connected to the Internet. The shields are preconfigured, based on our recommended settings. You do not need to configure any settings yourself unless you are an advanced user and would like to change the settings. See Changing shield settings. To view shield status or to disable shields: Open SecureAnywhere (see Using the SecureAnywhere interface).   Click the gear icon next to PC Security.   The Scan & Shields panel displays, showing the shields on the right.   A green button next to the shield name indicates the shield is on. We recommend that you keep all shields enabled; however, you can disable a shield by clicking the green button. For most shields, the window color scheme goes brown, indicating that your computer is not completely protected. For the Realtime Shield, the color scheme goes red, indicating that you are vulnerable to threats and should enable the shield.
View full article
The SecureAnywhere interface provides access to all functions and settings. To open the main interface, you can: Double-click the Webroot shortcut icon on your desktop: Right-click on the Webroot icon  from the system tray menu, then click View Status. (For Endpoint editions, click Open.) If you cannot locate the system tray icon, open the Windows Start menu, click All Programs (or Programs), Webroot SecureAnywhere, then Webroot SecureAnywhere again. When you open the main interface, it displays the Overview panel. Protected panel. The left section of the window displays information about system scans and the status of your subscription to SecureAnywhere. You can manually scan the system any time by clicking the Scan My Computer button. The default scan schedule is set to run daily at the time you installed the software. To change the schedule, click Advanced Settings > Scheduler. Computer Button. The default scan schedule is set to run daily at the time you installed the software. To change the schedule, click Advanced Settings > Scheduler. Stay Informed window. The panel at the bottom provides access to virus alerts and other important information from Webroot. Click Read Now to open the page in a browser. SecureAnywhere features. The right side of the main window provides links to SecureAnywhere features. To expand that section of the panel, click the name. For example, the above illustration shows the PC Security panel expanded. To view options related to each feature, click the gear icon. To return to the main window, click the left arrow on the tab bar. The green circle with a checkmark indicates that your license includes this feature. A plus sign on blue indicates a feature that is not installed.   Main Interface Options Advanced Settings Define how you want your installation of SecureAnywhere to operate. PC Security Change shield settings, manage firewall, and quarantine . Identity Protection Protect sensitive data that may be exposed during your online transactions. Backup & Sync Protect your files by uploading them to Webroot's online repository. Note:Backup & Sync may not be available in your edition. Password Manager Create a secure password generator and storage facility. Note: Passwords may not be available in your edition. Utilities Use tools to manage processes and files, view reports, and create a SafeStart Sandbox Note: The System Optimizer may not be available in your edition. My Account View your SecureAnywhere account information and access the Web Console. Support / Community Contact customer support or search for and discuss issues with the Webroot community.
View full article
Question How can I change my shield settings in WSA? Answer Shield settings provide advanced users with a little more control over shielding functions. To change shield settings: Open SecureAnywhere (see Using the SecureAnywhere interface)   In the upper right corner, click Advanced Settings.   Select Shields to display the Shield Settings panel.   If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When you’re done, click Save. The following table describes the shield options. Shield Settings options Prevent interruption by intelligently suppressing warnings Uses built-in intelligence to suppress warnings if they will interfere with operations. Automatically quarantine previously blocked files Remembers how you responded to an alert (allowed a file or blocked it). It won’t prompt you again when it encounters the same file but will take the same action as before, including sending it to quarantine if appropriate. If this option is deselected, SecureAnywhere opens an alert every time it encounters the file in the future. (If you blocked a file and want it restored, you can retrieve it from quarantine.) Check files for threats when written or modified Scans any new or modified files that you save to disk. If this option is deselected, it ignores new file installations (however, it will still alert you if a threat tries to launch). Block threats automatically if no user is logged in Stops threats from executing even when you are logged off. Threats are sent to quarantine without notification. Warn if untrusted programs make core system changes when offline. Displays a warning if an untrusted program tried to change core system settings while you were offline. Verify the integrity of the operating system Checks the operating system for problems. Silently and automatically block untrusted access to user data Automatically prevents unknown programs from accessing user data. Allow trusted programs to access protected data without warning Allows access to user data for trusted programs. Prevent any program from modifying the HOSTs file Prevents any program from modifying your HOSTs file.
View full article
Symptoms Diagnosis Solution AntiVirus Shields Settings for Android,   This is to make sure you have your Webroot shields enabled. Follow these steps below.   Open WebrootSecureAnywhere Mobile. Open Security on lower left hand side    Open Antivirus       There are items that need your attention Fix This Now       Install Shield is Turned OFF File System Shield is Turned OFF Execution Shield is Turned OFF Dialer Shield is Turned OFF Unknown Sources Shield is Turned OFF USB Debugging Shield Turned OFF     You may be at risk There are items that need your attention         To Check your Shields   Open Webroot/Security/Antivirus/Shields (lower right hand corner)       Online User Guide   Also in the right hand corner of Webroot is the Help Guide for the Android                       &
View full article
Question How do I report a malicious website or request that a good site be reclassified? Answer For website reputation change requests in WSA or WSA-Business Endpoint Protection, the support system is the best channel to reach out to us to have the reputation changed. For website reputation change requests in WSA-Mobile or WSA-Web Security Service, the support system is still a good choice, but you could alternatively look up the site via BrightCloud and use the change request link on the left side of the results page.
View full article
To detect websites associated with potential threats, the Web Threat shield analyzes URLs (web addresses) as follows:   When you enter the URL for a website or click a link to a site, SecureAnywhere runs the URL through its malware-identification engine. If the site is associated with malware, the Web Threat shield blocks the site from loading in your browser.   When you use a search engine, SecureAnywhere analyzes all links displayed on the search results page by running the URLs through its malware-identification engine. It then displays an image next to each link that signifies its risk level. For example, if a site is known for spreading malware infections, the Web Threat shield displays a warning next to the link. For Web Threat protection to work, make sure that the Web Threat shield is enabled, as described in Changing the Web Threat Shield. You can also determine if it's enabled by looking for the W button in the Safari taskbar: Surfing websites If you attempt to access a website that is associated with a known threat, phishing attempts, or exhibited some questionable behavior, the Web Threat shield displays an alert before the website loads. The alert displays in red if the site contains a known threat. It displays in yellow if the site is suspicious or unclassified. We recommend that you navigate away from this page (close the browser tab or click your browser’s Back button). However, if you still want to access the site despite the warning, click Proceed to blocked site. If you access this site frequently and don’t want this alert to appear again, click the checkbox at the bottom: I know this site, don’t warn me again. The Web Threat shield will then add the website to a trusted whitelist and will load the page directly the next time. Using search engines When you use a search engine, the Web Threat shield displays a rating next to the link for each search result. A green checkmark next to the web address indicates the site is safe to access. If the site is not classified as safe, the Web Threat shield displays a red hand, a yellow exclamation, or a gray question mark. You can click on the icon to read more about the threat classification:
View full article
A common question we get on the community is this: Is Webroot doing anything at all?  How do I know it is working?   Due to the rapid scans and minimal impact on performance, it can sometimes look like Webroot isn't doing anything at all.  But don't worry, all of that performance is being offloaded to our cloud servers.  Here's some more details about exactly how Webroot works quietly in the background, told by one of the most knowledgeable people on our community:   From @Baldrick:   Yes, this is normal with WSA and...Yes...you are well protected despite WSA not finding anything.   This is essentially down to the way that WSA works; it does not scan your entire drive and every file by default but rather it only scans for active files/apps, on the premise that if malware is dormant/inactive then it is not a threat...which makes absolute sense when you really think about it...but the moment that a dormant file/app starts to run/goes active WSA pounces on it, determines if good or bad and acts accordingly, i.e., allows to proceed or blocks & cleans, etc.   In the case of a non determination WSA will restrict the file's/app's actions and 'monitor' it which journalling its actions so that if at a later date it determines the file is bad then it can block/clean it and with the help of the journalled information reverse all changes made by it...pretty cool, eh?   And to give you the bigger picture on how WSA protects you please have a look at the below:       Original topic here.
View full article
How to Install and Activate Webroot for Android   Go to the Google Play Store and install Webroot Mobile Security     Mobile Security Webroot Inc.       Offers in-app purchases   FREE AntiVirus, internet security, and identity protection Webroot SecureAnywhere® Mobile keeps you secure when browsing, shopping, and banking on your Android™ device. It locates and locks lost or stolen devices, and automatically scans your apps for threats and malicious behavior.   MOBILE SECURITY ► Automatically scans apps for malware and viruses ► Set it and forget it – continuous protection without battery drain, interruptions or slowdowns ► Real-time anti-phishing identifies and blocks fake websites that trick you into entering your personal information ► Warns you about infected websites before you visit them ► Blocks unwanted calls and text messages ► Social network protection including Facebook and Twitter LOST DEVICE PROTECTION ► Lock – Remotely lock your device if lost or stolen ► Locate – See your device’s GPS location ► Scream – Sound an alert to help you find your device nearby *3G, 4G, or wifi connection required for lost device features   Click OPEN     Scan for Threats Now   In the upper right-hand corner where the 3 dots are click on this.  A Screen Opens at the Bottom with General Settings/ Change Password/Register/About/Uninstall   On the left lower screen you will see Register Click on Register. You will see your email and Keycode. Please write down your 20 digit keycode.     Insert your 20 digit keycode example (BDAFWRTS574AF86DBA92) without the hyphens. They will automatically insert.     Wait for Activation.   To create an account: Open your browser to the Webroot online management account website. You see the Login and Create an Account  Go here and use the function to create a new Account. Set this up with your same email amd Password that you used for installing the free version and then create a security code. Note: for "Internet Security Plus" and "Complete" users, activating by inputting your keycode will upgrade your mobile version from Free to the Webroot Version that you have paid for such as Complete (Complete users) or (Internet Security Plus users) and will also count as one of the "Seats" of your license. • More info on SecureAnywhere Mobile: https://www.webroot.com/us/en/home/products/mobile • Troubleshoot issues with installation or logging in: http://www5.nohold.net/Webroot/Loginr.aspx?pid=11&login=1&app=vw&solutionid=1925 • Need support?: http://www.webroot.com/us/en/support/support-home  
View full article
Symptoms Diagnosis Solution SecureWeb allows you to safely surf the Internet by blocking malicious websites from loading before you access them.   WSA Mobile SecureWeb for iOS User Guide : SecureWeb  browser opens with Secure Browsing enabled.   Tap on the W in the right hand uper corner. This will open some boxes as shown below. in diagram.   Sign in with your email address. Tap the arrow to the right to Login to Password Management.   This will give you access to Sites & Passwords (Bookmarks/ Favorites, toggle on or off)   History (You can clear your History there)   Form Fills   Search Settings: Tap to open and you will see Search Engine Tap and enter..Google, Yahoo, Bing, DuckDuck Go ,   Safe Search.Show Trust Level (toggle these on or off)   Web Protection: Open and set your protection to Normal (Recommended), High or Very High      
View full article