Knowledge Base

How can I change my shield settings in WSA?

  • 25 August 2014
  • 0 replies
How can I change my shield settings in WSA?
Userlevel 7
  • Retired Webrooter
  • 1581 replies


How can I change my shield settings in WSA?


Shield settings provide advanced users with a little more control over shielding functions.

To change shield settings:
  1. Open SecureAnywhere (see Using the SecureAnywhere interface)  
  2. In the upper right corner, click Advanced Settings. [img][/img]  
  3. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When you’re done, click Save. The following table describes the shield options. Shield Settings options Prevent interruption by intelligently suppressing warningsUses built-in intelligence to suppress warnings if they will interfere with operations. Automatically quarantine previously blocked filesRemembers how you responded to an alert (allowed a file or blocked it). It won’t prompt you again when it encounters the same file but will take the same action as before, including sending it to quarantine if appropriate. If this option is deselected, SecureAnywhere opens an alert every time it encounters the file in the future. (If you blocked a file and want it restored, you can retrieve it from quarantine.) Check files for threats when written or modifiedScans any new or modified files that you save to disk. If this option is deselected, it ignores new file installations (however, it will still alert you if a threat tries to launch). Block threats automatically if no user is logged inStops threats from executing even when you are logged off. Threats are sent to quarantine without notification. Warn if untrusted programs make core system changes when offline.Displays a warning if an untrusted program tried to change core system settings while you were offline. Verify the integrity of the operating systemChecks the operating system for problems. Silently and automatically block untrusted access to user dataAutomatically prevents unknown programs from accessing user data. Allow trusted programs to access protected data without warningAllows access to user data for trusted programs. Prevent any program from modifying the HOSTs filePrevents any program from modifying your HOSTs file.

This topic has been closed for comments