- Compatible with:
- Windows
- Available in:
- Desktop Security version 5
Desktop Security for Windows devices allows you to customize Threat Scans and Custom Scans according to your preferences. These scan options give you more control over how your device is scanned to help you meet specific security needs or performance considerations. Depending on the type of scan you are running, you may see some or all of the settings below:
- Quarantine all threats: Automatically quarantine detected threats without being notified first.
- Restart computer to remove threats: Automatically restart your device so threats can be removed from your computer without being prompted first. The Quarantine all threats setting needs to be enabled for this setting to be turned on.
- Use Smart Scan: When this setting is on, scans will start when your device is idle.
- Scan for rootkits: Rootkits are files stored on your computer's local disk drive that the operating system cannot see. These files can affect how the system works. Turning on this setting will check for rootkits when scanning your device, but also slow down the scan. This setting is unavailable on ARM-based devices.
- Scan within archives: Scan within archive files up to two levels deep, such as zip, 7z, rar, cab, and msi. Please note that password-protected archives cannot be scanned.
- Scan memory objects: Scan memory allocated by operating system processes, drivers, and other apps. This setting is only available in custom scans.
- Scan registry and startup items: Scan executable files or modifications that initiate when your device is turned on. This setting is only available in Custom scans.
- Potentially unwanted Programs (PUPs): Choose how PUPs are treated when detected on your device. In the drop-down menu select Ignore detections, Warn user about detections, or Treat detections as malware.
- Potentially unwanted Modifications (PUMs): Choose how PUMs are treated when detected on your device. In the drop-down menu select Ignore detections, Warn user about detections, or Treat detections as malware.