Views:
After detecting a threat, your security software follows a series of steps that depend on the type of threat and where it was found.
Threat Type
Response
Viruses
virus.png
Your security software analyzes basic information about every file that you open, save, or download. It will attempt to remove viruses from any infected files. Upon finding spyware or some other kind of "uncleanable" threat, your security software deletes the file instead.
Note
Note
If your security software does not have full "read/write" access to the file containing the threat (the file might have been stored on a CD-ROM or a "read-only" network drive), then it cannot remove the file. You should never open such files or copy them onto your computer.
Spyware
spyware_001.png
Your security software will delete the entire file or program. Occasionally, you will need to restart your computer to clear the memory and finish removing a threat.
Web Threats
webthreat.png
Upon detecting a website that could pose a threat, your security software will block access to it.
Note
Note
While some websites contain obvious threats or look blatantly fraudulent, others might only pose a risk. Whether or not potentially unsafe websites are blocked depends on the setting selected for Web Threat Protection.