User Guide: Quick Heal Total Security Multi-Device
User Guide: Quick Heal Total Security Multi-Device
User Guide: Quick Heal Total Security Multi-Device
ii
About This Document
This user guide covers all the information required to install and use Quick Heal Total Security
Multi-Device on Windows operating system.
The following table lists the conventions that we have followed to prepare this guide.
Convention Meaning
Bold Font Anything highlighted in bold indicates that it is a menu title, window
title, check box, drop-down box, dialog, button names, hyperlinks, and
so on.
This is a symbol used for a note. Note supplements important points or
highlights reservation related to the topic being discussed.
This is a symbol used for a tip. Tip helps users to apply the techniques
and procedures to achieve the task related to the topic being discussed.
This is a symbol used for warning or caution. This is an advice either to
avoid loss of data or damage to hardware.
<Step 1> The instruction mentioned in the numbered list indicates actions that
<Step 2> you need to perform.
Product Name We have used the product name Quick Heal Total Security in most of
the places to refer to Quick Heal Total Security Multi-Device.
Device We have used the term ‘device’ or ‘computing device’ in this manual. By
‘device’ or ‘computing device’, we mean computing devices such as
computer, laptop, or smartphone.
iii
Contents
1. Getting started.................................................................................................. 1
Prerequisites ............................................................................................................................. 1
System requirements ................................................................................................................ 1
Installing Quick Heal Total Security .......................................................................................... 3
Uninstalling Quick Heal Total Security ...................................................................................... 4
2. Registration, reactivation, and renewal ............................................................ 6
Registering Quick Heal Total Security ................................................................................. 6
Reactivation .............................................................................................................................. 7
Renewal..................................................................................................................................... 7
Renewing Quick Heal Total Security ................................................................................... 7
3. Quick Heal Dashboard....................................................................................... 9
About Quick Heal Dashboard .................................................................................................... 9
Right-click Menu Options ............................................................................................. 11
4. Quick Heal Protection Center .......................................................................... 13
Files & Folders ......................................................................................................................... 14
Scan Settings ..................................................................................................................... 14
Scan archive files .......................................................................................................... 15
Select the type of archive that should be scanned ....................................................... 16
Scan packed files .......................................................................................................... 16
Scan mailboxes ............................................................................................................. 17
Virus Protection ................................................................................................................ 17
Advance DNAScan ............................................................................................................. 18
Block Suspicious Packed Files ........................................................................................... 21
Automatic Rogueware Scan .............................................................................................. 21
Anti-Keylogger................................................................................................................... 21
Configuring Anti-Keylogger .......................................................................................... 21
Screen Locker Protection .................................................................................................. 21
Configuring Screen Locker Protection .......................................................................... 22
Scan Schedule ................................................................................................................... 22
Configuring Scan Schedule ........................................................................................... 22
Exclude Files & Folders ..................................................................................................... 24
Configuring Exclude Files & Folders ............................................................................. 25
Quarantine & Backup ........................................................................................................ 25
iv
Contents
v
Contents
vi
Contents
vii
Contents
viii
Contents
ix
Chapter
1
Getting started
You can install and use Quick Heal Total Security Multi-Device on as many computing devices as
your product key allows. This limit may be found in the email confirming your purchase details
or in the product package. You can install Quick Heal Total Security Multi-Device on any
combination of PC, laptop, or mobile with either Windows operating system (OS), Mac OS, or
Android OS.
During installation, read each installation screen carefully and follow the instructions.
Prerequisites
Remember the following guidelines before installing Quick Heal Total Security on your system.
Remove any other antivirus software program from your computer if you have any.
Multiple antivirus software products installed on a single computer may result in system
malfunction.
Close all open applications, browsers, programs, and documents for uninterrupted
installation.
Ensure that you have administrative rights for installing Quick Heal Total Security.
System requirements
To use Quick Heal Total Security, you must ensure the following requirements.
General requirements
1.4 GB free hard disk space on your computer
Internet Explorer 6 or later
Internet connection to receive updates and activate the software
1
Getting started
Note:
To check for the latest system requirements, visit our website at www.quickheal.com.
POP3 email clients compatibility
Quick Heal Total Security supports Quick Heal Total Security does not
support
Microsoft Outlook Express 5.5 and later IMAP
Microsoft Outlook 2000 and later AOL
Netscape Messenger 4 and later POP3s with Secure Sockets Layer (SSL)
Eudora Web-based email such as Hotmail and
Mozilla Thunderbird Yahoo! Mail
IncrediMail Lotus Notes
Windows Mail
Note: The Email Protection feature of Quick Heal Total Security is not supported on encrypted
email connections that use Secure Sockets Layer (SSL).
2
Getting started
The following features of Quick Heal Total Security follow specific compatibility
Features Conditions
Browser Sandbox This feature supports Internet Explorer, Google Chrome, and
Mozilla Firefox browsers only.
This feature does not support Microsoft Edge browser of
Windows 10 operating system.
Safe Banking This feature supports Internet Explorer, Google Chrome, and
Mozilla Firefox browsers only.
This feature does not support Microsoft Edge browser of
Windows 10 operating system.
Self-Protection Process protection functionality of Self-Protection is
supported on Microsoft Windows Vista SP 1 and later.
Mobile Scan For Windows Mobile devices,
(PC2Mobile Scan) o Microsoft Active Sync 4.0 or later must be installed on
Windows XP or previous OS.
o Windows Mobile Device Center must be installed on
Windows Vista or later OS.
Anti-Rootkit Is supported on 32-bit OS only.
Remotely Manage Supports Internet Explorer 9 and later.
Quick Heal
3
Getting started
The installation wizard performs a pre-install virus scan of the system. If a virus is found
active in memory, then:
The installer automatically sets the boot time scanner to scan and disinfects the system
on the next boot.
After disinfection of your computer, the computer restarts and you need to re-initiate
the installation. For more details, see Performing Boot Time Scan.
If no virus is found in the system memory, the installation proceeds.
The End-User License Agreement screen appears. Read the license agreement carefully.
At the end of the license agreement, there are two options Submit suspicious files and
Submit statistics which are selected by default. If you do not want to submit the suspicious
files or statistics or both, clear these options.
Select I Agree if you accept the terms and then click Next.
The Install Location screen appears. The default location where Quick Heal Total Security is
to be installed is displayed. The disk space required for the installation is also mentioned on
the screen.
If the default location has insufficient space, or if you want to install Quick Heal Total
Security on another location, click Browse to change the location or click Next to continue.
The installation is initiated. When installation is complete, a message appears.
Click Register Now to initiate the activation process or click Register Later to perform
activation later.
4
Getting started
Please note down the product key for future reference. You can save your
product key information by clicking Save to file. Restart of your computer is
recommended after Quick Heal Total Security uninstallation. To restart click
Restart Now, or click Restart Later to continue working on the system and
restart after some time.
5
Chapter
2
Registration, reactivation, and renewal
You should register your product immediately after installing it. Unless you register the
product, it will be considered as a trial version. Also, a subscriber with registered license can use
all the features without any interruptions, take the updates regularly, and get technical support
whenever required. If your product is not regularly updated, it cannot protect your system
against the latest threats.
While registering Quick Heal Total Security, please take note of the following points.
The license validity of the Product Key activated on the first computing device applies to all
other devices, whether you activate different devices at different points of time.
6
Registration, reactivation, and renewal
Your product is activated successfully. The expiry date of your license and the count of the
registered devices are displayed.
Click Finish to close the Registration Wizard.
Once you register Quick Heal Total Security, you are prompted to create an
account with Quick Heal RDM, which allows you to manage your device remotely.
To know about how to create an account with Quick Heal RDM, see Remotely
Manage Quick Heal.
Reactivation
Reactivation is a facility that ensures that you use the product for the entire period until your
license expires. Reactivation is helpful in case you format your system when all software
products are removed. In such cases, you need to re-install and reactivate Quick Heal Total
Security on your system.
The reactivation process is similar to the activation process, with the exception that you do not
need to enter the complete personal details again. Upon submitting the Product Key, the
details are displayed. You can just verify the details and complete the process.
If you have saved the license backup using the Remove Quick Heal and keep update definitions
files option during uninstallation on your computer, and initiate reactivation, the Product Key is
displayed on the Quick Heal registration dialog box. You can proceed with the found Product
Key and the updates you saved. Moreover, you can also use another Product Key if you prefer.
Upon submitting the Product Key, the user details are displayed. You can verify the details and
complete the process.
Renewal
You can renew your product license as soon as it expires by purchasing a renewal code.
However, you are recommended to renew your product before your product license expires so
that your computers remain protected. You can buy the renewal code from the website of
Quick Heal, or from the nearest distributor or reseller.
7
Registration, reactivation, and renewal
Select the option I have renewal code with me if you have already bought the renewal code
and click Next.
Note: If you do not have a renewal key and want to renew your license, select I do not have
renewal code with me and then make the purchase.
Enter the renewal code and then click Next.
The Registration Information appears.
Relevant information in the Purchased From, Email Address, and Contact Number text
boxes appears pre-filled. However, you can modify your contact details if required and then
click Next.
The information about renewal is displayed.
Click Next.
The license summary such as Current expiry date and New expiry date is displayed for your
confirmation.
Click Next.
The license of Quick Heal Total Security is renewed successfully.
Click Finish to complete the renewal process.
If you have purchased an additional renewal code, the renewal can be performed
only after 10 days of the current renewal.
The license validity of the Product Key renewed on the first device applies to all
the remaining devices.
8
Chapter
3
Quick Heal Dashboard
The Quick Heal Total Security Dashboard serves as the main interface to all the features of
Quick Heal Total Security. Quick Heal Total Security protects your system even with the default
settings. You can open Quick Heal Total Security to check the status of protection, to manually
scan the system, view reports, and update the product.
You can manually start Quick Heal Total Security in any one of the following ways:
Select Start > Programs > Quick Heal Total Security > Quick Heal Total Security.
On the taskbar, double-click the Quick Heal Total Security icon or right-click the Quick Heal
Total Security icon and select Open Quick Heal Total Security.
Select Start > Run, type Scanner and press the Enter key.
Menus Description
Settings Helps you customize features such as Automatic Update, Internet Settings,
Registry Restore, Self Protection, Password Protection, Reports Settings,
Report Virus Statistics, Remotely Manage Quick Heal, and Restore Default
Settings.
Tools Helps you diagnose your system in case of virus attacks, clean application
and Internet activities, restore the Internet Explorer settings modified by
9
Quick Heal Dashboard
malwares, isolate the infected and suspicious files, remove rogueware and
prevent USB drives against autorun malware infection. You can also
exclude files from virus protection.
Reports Helps you view the activity reports of Scanner, Virus Protection, Email
Protection, Scan Scheduler, Behavior Detection, Quick Update, Memory
Scan, Phishing Protection, Registry Restore, Boot Time Scanner,
AntiMalware Scan, Firewall Protection, Parental Control, IDS & IPS,
Browsing Protection, PC2Mobile Scan, Vulnerability Scan, Safe Banking,
and Anti-Keylogger.
Help Helps you access the Help tool for Quick Heal Total Security, see details
about product version, virus database, validity details, license details, and
seek technical support.
Options Description
Files & Folders Helps you protect files and folders against malicious threats.
With this option, you can configure Scan Settings, Virus Protection,
Advance DNAScan, Block Suspicious Packed Files, Automatic Rogueware
Scan, Anti-Keylogger, Screen Locker Protection, Scan Schedule, Exclude
Files & Folders, and Quarantine & Backup.
Emails Helps you configure Email Protection, Trusted Email Clients Protection,
and Spam Protection.
Internet & Helps you configure the settings for Internet & Network protection. With
Network this option, you can configure Firewall Protection, Browsing Protection,
Malware Protection, Phishing Protection, Browser Sandbox, Safe
Banking, News Alert, and IDS/IPS.
Parental Control Helps you control the Internet access, application access, and computer
access for the children and other users.
External Drives & Helps you configure protection for external drives. With this option, you
Devices can configure Autorun Protection, Scan External Drives, Data Theft
Protection and Scan Windows Mobile.
To know more about this section, see Quick Heal Protection Center.
10
Quick Heal Dashboard
Bottom section
The following table describes the options and their usage.
Miscellanies Description
News Displays the latest news from Quick Heal. You can see all the news by
clicking See All.
PCTuner Helps you improve your system performance by cleaning your system with
features such as Disk Cleanup, Registry Cleanup, Traces Cleanup, Duplicate
File Finder, Secure Delete, and Registry Defragmenter.
Scan Provides you with various scan options such as Full System Scan, Custom
Scan, Memory Scan, Boot Time Scan, Mobile Scan, and Vulnerability Scan.
My Account With this link, you can go to the web portal of Quick Heal Remote Device
Management (Quick Heal RDM). You can add your product to Quick Heal
RDM to monitor the product remotely through the portal.
Virtual Virtual Keyboard helps you enter the required information without
Keyboard pressing any keys on the physical keyboard. It reduces the risk of getting
your information recorded by a possible keystroke logger malware. When
you launch Safe Banking, you should prefer virtual keyboard.
Hovering: Helps you enter the information by hovering over the keys than
actually clicking the mouse. Using this feature, you can reduce the risk of
being tracked by the malwares that record click of the mouse.
Shuffling: Helps you shuffle the alphabets and characters on the virtual
keyboard each time you click the mouse. This reduces the risk of
eavesdropping about what information you type with the virtual keyboard.
Support Helps you get to various support options available in the Support menu.
Facebook Like With this link, you can like the Quick Heal page on Facebook.
Quick Heal’s corporate Facebook page has a vibrant community of users
and a host of regular posts on cyber security and virus threats and alerts.
You can follow the Quick Heal Facebook page by clicking the ‘Facebook
Like’ link available on Dashboard.
Alternately, if you are logged on to Facebook but you are not a part of the
Quick Heal community on Facebook, you will get a prompt to like and
follow the Quick Heal page.
11
Quick Heal Dashboard
12
Chapter
4
Quick Heal Protection Center
While working with computer system, you are connected to the Internet, external drives, and
send and receive email communications. This makes your system exposed to viruses that try to
infiltrate into your system. Quick Heal Protection Center includes those features that allow you
to secure your systems, folders, files, and data against any possible threats of malware, viruses,
worms, and data theft.
Just above the features current status about your Quick Heal Total Security product is
displayed. If the antivirus detects any threat in your system, it is indicated through color coded
icons.
The following table describes the icons and their meanings.
Green Indicates that Quick Heal Total Security is configured with optimal
settings and your system is protected.
Orange Indicates that a feature of Quick Heal Total Security needs your
attention at your earliest convenience, but not immediately.
Red Indicates that Quick Heal Total Security is not configured with optimal
settings and your immediate attention is needed. The action
corresponding to the message needs to be carried out immediately to
keep your system protected.
Quick Heal Protection Center includes the following features.
Features Description
Files & Folders Includes Scan Settings, Virus Protection, Advance DNAScan, Block
Suspicious Packed Files, Automatic Rogueware Scan, Anti-Keylogger,
Screen Locker Protection, Scan Schedule, Exclude Files & Folders, and
Quarantine & Backup.
Emails Includes Email Protection, Trusted Email Clients Protection, and Spam
Protection.
Internet & Includes Firewall Protection, Browsing Protection, Malware Protection,
Network Phishing Protection, Browser Sandbox, Safe Banking, News Alert, and
IDS/IPS.
13
Quick Heal Protection Center
Parental Control Allows parents to control the Internet access, application access, and
computer access for the children and other users.
External Drives & Includes Autorun Protection, Scan External Drives, Data Theft Protection,
Devices and Scan Windows Mobile.
Scan Settings
This feature helps you define about how to initiate the scan of your system and what action
should be taken when a virus is detected. However, the default settings are optimal that
ensures the required protection to your system.
To configure Scan Settings, follow these steps:
Open Quick Heal Total Security.
On the Quick Heal Total Security Dashboard, click Files & Folders.
On the Files & Folders screen, click Scan Settings.
Under Select scan mode, select Automatic (Recommended) to initiate the scan
automatically, or select Advanced for advanced level scanning.
Under Select action to be performed when virus is found, select an appropriate action.
If you want to take a backup of the files before taking an action on them, select Backup
before taking action.
To save your settings, click Save Changes.
Select scan mode
Automatic (Recommended): It is the default scan type and is recommended as it ensures the
optimal protection to your system. This setting is an ideal option for novice users.
Advanced: This helps you customize the scan option. This is ideal for experienced users. When
you select the Advanced option, the Configure button is activated and you can configure the
Advanced settings for scanning.
Action to be performed when a virus is found
Various actions and their description are as follows:
Action Description
Repair Select this option if you want to repair an infected file.
If a virus is found during a scan in a file, it repairs the file. If the file cannot
be repaired, it is quarantined automatically.
14
Quick Heal Protection Center
15
Quick Heal Protection Center
Action Description
Delete Select this option if you want to delete an infected file. The-infected file is
deleted without notifying you.
Quarantine Select this option if you want to quarantine an infected archive if a virus
is found in it.
Skip Select this option if you want to take no action on an infected file.
16
Quick Heal Protection Center
Packers can also be used as tools to spread malware by packing a malicious file along with a set
of files. When such packers are unpacked they can cause harm to your computer system. If you
want to scan packers, select the Scan packed files option.
Scan mailboxes
This feature allows you to scan the mailbox of Outlook Express 5.0 and later versions (inside the
DBX files). Viruses such as KAK and JS.Flea.B, remain inside the DBX files and can reappear if
patches are not applied for Outlook Express. It also scans the email attachments encoded with
UUENCODE/MIME/BinHex (Base 64). Scan mailboxes is selected by default which activates the
following two options:
Options Description
Quick scan of Helps you skip all the previously scanned messages and scan only new
mailboxes messages. This option is selected by default.
Thorough scan Helps you scan all the mails in the mailbox all the time. However, this
of mailboxes may affect the speed as the size of the mailbox increases.
Virus Protection
Viruses from various sources such as email attachments, Internet downloads, file transfer, and
file execution try to infiltrate your system. This feature helps you to continuously keep
monitoring for viruses. Importantly, this feature does not re-scan the files that have not
changed since the previous scan. This helps in maintaining lower resource usage.
It is recommended that you always keep Virus Protection turned on to keep your system clean
and secure from any potential threats. However, Virus Protection is turned on by default.
To configure Virus Protection, follow these steps:
Open Quick Heal Total Security.
On the Quick Heal Total Security Dashboard, click Files & Folders.
On the Files & Folders screen, turn Virus Protection on.
Click Virus Protection.
The Virus Protection details screen appears.
Set the following options as per requirement:
Display alert message – Select this option if you want to get the alerts on various events
such as when malware is detected. However, this option is selected by default.
Select action to be performed when virus is detected – Select an appropriate action
when a virus is detected during the scan.
Backup before taking action – Select this option if you want to take a backup of a file
before taking an action. Files that are stored in the backup can be restored from
Quarantine.
17
Quick Heal Protection Center
Enable sound when threat is detected – Select this option if you want to be alerted with
sound whenever a virus is detected.
Click Save Changes to save your setting.
Action to be taken when a virus is detected
Action Description
Repair If a virus is found during a scan, it repairs the file. If the file cannot be
repaired, it is quarantined automatically.
Delete Deletes a virus-infected file without notifying you.
Deny Access Restricts access to a virus infected file from use.
Advance DNAScan
DNAScan is an indigenous technology of Quick Heal to detect and eliminate new and unknown
malicious threats in your system. Advance DNAScan technology successfully traps suspected
files with very less false alarms. Additionally, it quarantines the suspected file so that malware
does not harm your system.
18
Quick Heal Protection Center
The quarantined suspicious files can be submitted to the Quick Heal research labs for further
analysis that helps in tracking new threats and curb them on time. After the analysis, the threat
is added in the known threat signature database and the solution is provided in the next
updates to the users.
To configure Advance DNAScan, follow these steps:
Open Quick Heal Total Security.
On the Quick Heal Total Security Dashboard, click Files & Folders.
On the Files & Folders screen, click Advance DNAScan.
The Advance DNAScan details screen appears.
Select either of the following options as per requirement:
Enable DNAScan: Select this option to enable DNAScan.
Enable Behavior detection system: Select this option if you want to enable Behavior
detection system. The running applications will be monitored for their behavior. You can
also set a security alert level from the Select Behavior detection level list either as High,
Moderate, or Low.
o High: If you select this security level, Quick Heal Total Security will closely monitor
the behavior of a running application and will alert you if any unusual application
behavior is noticed. You may receive more alerts and sometimes even for genuine
files.
o Moderate: If you select this security level, Quick Heal Total Security will send alert if
any suspicious activity of a running application is noticed.
o Low: If you select this security level, Quick Heal Total Security will send alert only if
any malicious activity of a running application is noticed.
Note: If you have selected Moderate or Low security level, Behavior detection
system will also block many unknown threats in the background without prompting
you for any action if it finds the application behavior suspected.
Do not submit files: Select this option if you do not want to submit suspicious files to
the Quick Heal research labs.
Submit files: Select this option if you want to submit the suspicious files to the Quick
Heal Research labs for further analysis. You can also select Show notification while
submitting files to get prompts for permission before submitting the files.
If the option Show notification while submitting files is not selected, Quick
Heal will submit the suspicious files without notifying you.
19
Quick Heal Protection Center
20
Quick Heal Protection Center
Anti-Keylogger
Keyloggers are malicious programs that record all information typed by you on the keyboard of
your computer or laptop and share that information with the hackers. You may lose
confidential information such as usernames, passwords, or PIN to the hackers. Anti-Keylogger
helps you prevent information getting recorded by keystroke logger malware.
Configuring Anti-Keylogger
Open Quick Heal Total Security.
On the Quick Heal Total Security Dashboard, click Files & Folders.
On the Files & Folders screen, turn Anti-Keylogger on or off as you prefer.
21
Quick Heal Protection Center
short-cut key, you can initiate cleaning up of your computer and remove the malicious
program.
You have to restart your computer at least once after you install the product to
activate this feature.
Scan Schedule
Scanning regularly helps you keep your system free from virus and other types of infections.
This feature allows you to define a schedule when to begin scanning of your system
automatically. You can define multiple numbers of scan schedules to initiate scan at your
convenience.
22
Quick Heal Protection Center
Scan time:
o Start at first boot: This helps you schedule the scanner to begin at the first boot of
the day. If you select this option, you do not need to specify the time of the day to
start the scan. Scanning takes place only during the first boot regardless what time
you start your system.
o Start at: Select this option to initiate the scanning of your system at a certain time. If
you select this option, the time drop-down list is activated where you can set the
time for scanning. However, this option is selected by default.
You can further define how often the scan should begin in the Everyday and Repeat
scan after every options.
Scan priority.
o High: Helps you set high scan priority.
o Low: Helps you set low scan priority . However, this option is selected by default.
Under Scan Settings, you can specify scan mode, define the advanced options for scanning,
action to be performed when virus is found and whether you want a backup of the files
before taking any action on them. However, the default setting is adequate for scanning to
keep your system clean.
In the Username text box, enter your username and your password in the Password text
box.
Run task as soon as possible if missed: Select this option if you want to initiate scanning
when the scheduled scan is missed. This is helpful in case your system was switched off and
the scan schedule passed, later when you switch on your system, the scan schedule will
automatically start as soon as possible.
This option is available only on Microsoft Windows Vista and later operating systems.
Click Next.
The Configure Scan Schedule screen for adding folders to be scanned appears.
Click Add Folders.
In the Browse for Folder Window, select the drives and folders to be scanned. You can add
multiple numbers of drives and folders as per your requirement.
If you want to exclude subfolders from being scanned, you can also select Exclude
Subfolder. Click OK.
On the Configure Scan Schedule screen, click Next.
A summary of your scan schedule appears. Verify and click Finish to save and close the Scan
Schedule dialogue.
Click Close to close the Scan Schedule screen.
23
Quick Heal Protection Center
24
Quick Heal Protection Center
You can exclude files from being scanned from the following scanning modules:
Scanner
Virus Protection
Memory Scanner
DNAScan
If you are getting warning for a known virus in a clean file, you can exclude it for
scanning of Known Virus Detection.
If you are getting a DNAScan warning in a clean file, you can exclude it from being
scanned for DNAScan.
25
Quick Heal Protection Center
You can also set when the quarantined files should be removed from Quarantine and have a
backup of the files if you need.
Emails
With this feature, you can configure the protection rules for all incoming emails. These rules
include blocking infected attachment/s (malware, spam and viruses) in the emails. You can also
set an action that needs to be taken when malware is detected in the emails.
Email Security includes the following features.
26
Quick Heal Protection Center
Email Protection
This feature is turned on by default which provides the optimal protection to the mailbox from
malicious emails. We recommend that you always keep Email Protection turned on to ensure
email protection.
The message on viruses includes the following information: Virus Name, Sender
Email Address, Email Subject, Attachment Name, and Action Taken.
Under Select action to be performed when virus is found, select Repair to get your emails
or attachment repaired when a virus is found, or select Delete to delete the infected emails
and attachments.
Select Backup before taking action if you want to have a backup of the emails before taking
an action on them.
Under Attachment control settings, select an option for blocking certain email types and
attachments.
Click Save Changes to save your settings.
Attachment Control Settings
Block attachments Helps you block attachment in emails with multiple extensions. Worms
with multiple
extensions
commonly use multiple extensions which you can block using this
feature.
Block emails Helps you block emails whose sole purpose is to exploit vulnerabilities of
crafted to exploit
vulnerability
mail clients. Emails such as MIME, IFRAME contain vulnerability.
27
Quick Heal Protection Center
Enable attachment Helps you block email attachments with specific extensions or all
control
extensions. If you select this option, the following options are activated:
Block all attachments: Helps you block all types of attachments in emails.
Block user specified attachments:
Helps you block email attachments with certain extensions. If you select
this option, the Configure button is activated. For further settings, click
Configure and set the following options:
Under User specified extensions, select the extensions that you want
to retain so that the email attachments with such extensions are
blocked and all the remaining extensions are deleted.
If certain extensions are not in the list that you want to block, type
such extensions in the extension text box and then click Add to add
them in the list.
Click OK to save changes.
Spam Protection
Spam Protection allows you to differentiate genuine emails and filter out unwanted emails such
as spam, phishing, and adult emails. We recommend you to keep Spam Protection enabled.
28
Quick Heal Protection Center
29
Quick Heal Protection Center
While entering an email address, be careful that you do not enter the same email address in
the blacklist that you have entered in the whitelist, or else a message appears.
To edit an email address, select the email address in the list and click Edit. To remove an
email address, select an email address and click Remove.
You can import the blacklist by clicking Import List.
This is very helpful if you have exported the list of emails or saved AntiSpam data and want
to use such emails.
You can export the blacklist by clicking Export List.
This exports all the email addresses existing in the list. This is helpful when you want to re-
install Quick Heal Total Security later or on other computers and you want to have the same
email addresses to be enlisted later.
Click OK to save your settings.
Setting spam protection rule for whitelist
Whitelist is the list of trusted email addresses. Content from the whitelisted email addresses is
allowed to skip the spam protection filtering policy and is not tagged as SPAM.
This is helpful if you find that some genuine email addresses get detected as SPAM. Or if you
have blacklisted a domain but want to receive emails from certain email addresses from that
domain.
To add email addresses in the whitelist, follow these steps:
On the Spam Protection setting screen, select Enable email white list.
The Customize button is activated.
Click Customize.
Enter an email address in the whitelist text box and then click Add.
While entering an email address, be careful that you do not enter the same email address in
the whitelist that you have entered in the blacklist, or else a message appears.
To edit an email address, select the email address in the list and click Edit. To remove an
email address, select an email address and click Remove.
You can import the whitelist by clicking Import List.
This is very helpful if you have exported the list of emails or saved AntiSpam data and want
to use such emails.
You can export the whitelist by clicking Export List.
This exports all the email addresses existing in the list. This is helpful when you want to re-
install Quick Heal Total Security later or on other computers and you want to have the same
email addresses to be enlisted later.
Click OK to save your settings.
30
Quick Heal Protection Center
Firewall Protection
Firewall shields your system from intruders and hackers by monitoring and filtering incoming
and outgoing network traffic. Any suspicious program that may be harmful to your computers
or systems is blocked. Firewall protects your computers from malicious programs either from
outside internet connection or from within networks incoming into your system.
31
Quick Heal Protection Center
Program Rules
With Program Rules, you can allow or block programs from accessing the Internet.
To create rules for programs, follow these steps:
On the Firewall Protection screen, click the Configure button next to Program Rules.
On the Configure Program Rules screen, click the Add button to add a program.
Only an executable program can be added.
The program that you added is enlisted in the program list. Under the Access column, select
Allow or Deny for accessing the network as required.
To save your setting, click OK.
Allow only trustworthy programs
Trustworthy programs are those programs that are verified and their identity is known while
untrustworthy programs are those ones that are not verified or are suspicious. Malicious
programs mask their identity to run a covert operation. Such programs may be harmful to the
network and computers.
You can block all untrustworthy programs from accessing the Internet by selecting the Allow
only trustworthy programs checkbox.
Security Level
Firewall security level includes the following:
Low: Allows all incoming and outgoing connections.
Medium: Monitors incoming traffic and displays the message as per suspicious behavior of
an application.
High: Monitors both incoming and outgoing traffics and displays the message as per
suspicious behavior of an application.
Block all: Blocks all incoming and outgoing connections. If you set this security level,
Internet connection for all applications including Quick Heal Total Security will be blocked.
For example, Quick Heal update and sending system information among other features may
not work.
Advanced Settings
To create rules for incoming and outgoing network traffics, follow these steps:
On the Firewall Protection screen, click the Configure button next to Advanced Settings.
On the Advanced Settings page, select the following as required:
Display Alert Message: Select this option if you want to get alert messages if
connections matching exceptions rule are made for blocked outbound connections. This
applies to outbound connections only.
32
Quick Heal Protection Center
Create Reports: Select this option if you want a report to be created. You may also
configure a different path to save the report.
Network Connections: Using this option, set a network profile for network connections.
Traffic Rules: Using this option, set rules for network traffic.
To save the settings, click OK.
Network Connections
With Network Connections, you can set a Firewall profile for network connections. Under
Network Profile Settings, you can see the following settings.
Settings Description
Network Profile Home: All incoming and outgoing connections are allowed except
exceptions.
Work: All incoming and outgoing connections are allowed except
exceptions.
Public: All incoming and outgoing connections are allowed except
exceptions.
Restricted: All incoming and outgoing connections are blocked except
exceptions.
Note: The logic for network profile may be changed based on your
requirement. For example, if a network environment is considered less
risky, you may turn stealth mode on or off. Similarly, you may allow or
block sharing of file and printer. However, default setting is ideal for
required security.
Stealth Mode Enabling Stealth Mode hides your system in the network making it
invisible to others thus preventing attacks.
File & Printer Allowing this option will enable you to share file & printer between
Sharing other users and you. However, with sharing of files and printer, the
files may be accessed by unauthorized entities.
Traffic Rules
With Traffic Rules, you can allow or block network traffic. You can add exception to allow or
deny incoming and outgoing communications through IP addresses and ports.
To configure a policy, follow these steps:
On the Advanced Settings screen, click the Traffic Rules tab.
Click the Add button.
In the Exception Name text box, write a rule name and then select a protocol. Click Next.
The protocol includes: TCP, UDP, and ICMP.
33
Quick Heal Protection Center
Under Local IP Address, select either Any IP Address, IP Address, or IP Address Range. Type
the IP Address accordingly and then click Next.
Under Local TCP/UDP Ports, select either All Ports, Specific Port(s), or Port Range. Type the
Ports accordingly and then click Next.
Under Remote IP Address, select either Any IP Address, IP Address, or IP Address Range.
Type the IP Address accordingly and then click Next.
Under Remote TCP/UDP Ports, select either All Ports, Specific Port(s), or Port Range. Type
the Ports accordingly and then click Next.
Under Select Action, select either Allow or Deny.
Under Network Profile, select either or a combination of the profile options such as Home,
Public, Work, or Restricted.
Click Finish.
The following table describes the buttons and their functions.
Buttons Description
Add Helps you create an exception rule.
Delete Helps you delete an exception rule from the list. Select the rule and then
click Delete.
Up Helps you move a rule upward to arrange according to your preference.
Down Helps you move a rule downward to arrange according to your preference.
Default Helps you set the rules to default settings.
OK Helps you save your settings.
Cancel Helps you cancel your settings and close the Advanced Settings dialog.
Browsing Protection
While users visit malicious websites, some files may get installed on their systems. These files
may spread malware, slow down the system, or corrupt other files. These attacks can cause
substantial harm to the system.
Browsing Protection ensures that malicious websites are blocked while the users access the
Internet. Once the feature is enabled, any website that is accessed is scanned and blocked if
found to be malicious.
34
Quick Heal Protection Center
Malware Protection
This feature helps you protect your system from threats such as spyware, adware, keyloggers,
and riskware while you are connected to the Internet.
Action Description
Prompt If you select this option, a message will appear when an adware is
detected. The message will display the following options:
Allow: Click this button to allow the adware to execute.
Remove: Click this button to remove the adware. In case, the adware is
not removed successfully, the adware is quarantined and will be
cleaned in next Boot Time Scan.
Close: Click this button to close the message. However, the same
message will keep appearing until you take an action.
Repair Select this option if you want to repair a file.
If an adware is found in a file during scan, it repairs the file. If the file
cannot be repaired, it is quarantined and will be cleaned in the next Boot
Time Scan.
Skip Select this option if you want to take no action on a file.
Phishing Protection
Phishing is a fraudulent attempt, usually made through email, to steal your personal
information. These emails usually appear to have been sent from seemingly well-known
35
Quick Heal Protection Center
organizations and websites such as banks, companies and services seeking your personal
information such as credit card number, social security number, account number or password.
Phishing Protection prevents the users from accessing phishing and fraudulent websites. As
soon as a website is accessed, it is scanned for any phishing behavior. If found so, it is blocked
to prevent any phishing attempts.
Browser Sandbox
When you browse the Internet, you are clueless about which sites are trusted and verified.
Trusted sites are those that publish their identity so that they are established as known entities.
However, all untrusted sites are not fake sites or phishing sites. Untrusted websites may be
commercial websites, suppliers, sellers, third parties, advertisements, and entertainment
websites.
Malicious sites mask their identity to run a covert operation. These sites can hack your
confidential credentials, infect your computer, and spread spam messages.
Browser Sandbox keeps you safe from any kind of malicious attacks. Browser Sandbox applies a
strict security policy for all untrusted and unverified websites. If you open any downloaded files
with Browser Sandbox turned on, such files open in Browser Sandbox to isolate any possible
infection.
36
Quick Heal Protection Center
The data in the confidential folder will not be accessible by the browser and other
applications running under Browser Sandbox. Therefore, your data is safe from being
siphoned off.
To protect your data from being manipulated, select Prevent browser from modifying
the protected data and then select the folder that you want to protect.
The data in the protected folder will be accessible but the data cannot be manipulated
or modified.
To download content to a certain folder while surfing, select Allow browser to store all
downloads in the specified folder and then give the path to the folder.
This helps you download content that you need for future use to a certain folder while
surfing.
To clean Sandbox cache, click the Delete button.
This helps you clean temporary files.
Click Save Changes to save your settings.
Safe Banking
With online banking, you can check your accounts, pay bills, buy and sell shares, and transfer
money between different accounts. For doing these things, you visit a banking website, enter
your identity credentials, and carry out the required transactions.
However, while visiting a banking website, you can become a prey to a fake banking website or
when you type your credentials, the information can be phished to a fraudster. As a result, you
may lose your money.
37
Quick Heal Protection Center
Safe Banking shields you from all possible situations where your identity or credentials can be
compromised. Safe Banking launches your entire banking session in a secure environment that
protects your vital data.
Safe Banking has the following features:
Browser is launched in an isolated environment to prevent zero day malware from infecting
the computer.
Your banking activity is isolated from the Internet threat.
All types of keystroke recording tools are blocked to safeguard against key logging of
confidential data.
Employs secure DNS to prevent hacking attacks.
Ensures that you visit only verified and secured websites.
To work in the Safe Banking environment, follow these steps:
1. Setting Safe Banking
2. Launching Safe Banking
38
Quick Heal Protection Center
News Alert
With this feature, you get the latest news about cyber security, virus threats and alerts and
other important information related to the computer protection. The latest news is also
available on the Quick Heal Total Security Dashboard. If you do not want to get the news alert,
turn News Alert off.
IDS/IPS
With IDS/IPS, your computer remains secure from unwanted intrusion attempts or attacks by
the hackers.
39
Quick Heal Protection Center
Turning IDS/IPS ON
To turn IDS/IPS on, follow these steps:
Open Quick Heal Total Security.
On the Quick Heal Total Security Dashboard, click Internet & Network.
On the Internet & Network scree, turn IDS/IPS on.
Parental Control
Parental Control is a very effective method to control the Internet access, application access,
and computer access by the children and other users. This feature ensures that the children and
other users do not visit inappropriate types of Web sites, and can only access the allowed
applications so that they are safe from any virus threats. Parents can also limit access to the
computer and Internet on a day and time basis.
Important things to do before configuring parental control!
To get the maximum benefits from the Parental Control feature, we recommend that you
configure the following options:
First step
Check if you are logged in as an Administrative user to the computer on which you have
installed Quick Heal Total Security. In case you are not an administrative user, we recommend
that you create an Administrator account and configure it. Do not share the administrative
credentials with the users for whom you are creating restricted accounts.
Second step
Create separate Standard accounts (Restricted user) for your children or other users. This way,
they will have only limited access to the computer. This also helps you apply different
protection policies to different users. The protection policies could include website preferences
for each restricted user and a schedule for Internet access.
Third step
Set a password to restrict unauthorized users from modifying the settings or removing Quick
Heal Total Security from the computer. To see how to set password to Quick Heal Total
Security, see Quick Heal Password Protection.
40
Quick Heal Protection Center
Select Display alert message, if you want to receive alert message when the users visit a
blocked website.
Under Select whom to apply the settings, select one of the following options:
Apply to all users: Select this option if you want to apply the same setting to all users. If
you select this option, the All Users option is displayed below.
Apply to specific users: Select this option if you want to apply different settings to
different users. If you select the Apply to specific users option, a list of all users is
displayed below.
To configure further settings, click a user available under Select whom to apply the
settings. Users are displayed based on the options whether you have selected Apply to all
users or Apply to specific users.
The protection rules screen appears. You can configure any or all of the following options
based on your requirement.
Internet Browsing Control
Application Control
PC Access Control
After configuration, click Save Changes to save your settings.
41
Quick Heal Protection Center
On the Web Category screen, select an age group under Block the website categories based
on age group for restricting access to certain types of websites for your children or other
users. If you can select a certain age group, optimum settings will be applied. You may
customize the predefined settings for an age group if required. To reset the customized
settings of an age group, refresh the same age group. You may revert to the default settings
anytime by selecting the Default option.
Under Select access rights for below categories of website, turn on a website category to
allow access to the websites or turn off to deny access. Moreover, the default settings are
optimal and ideal for novice users.
If you want to exclude a certain website from the blocked category, enlist such a website in
the exclusion list. For example, if you have blocked the Streaming Media and Downloads
category, but you still want to allow access to YouTube, you can do so by enlisting YouTube
in the exclusion list.
On the Web Category dialogue, click the Exclude button.
In the Enter URL text box, enter the URL of the website that you want to allow users to
access and then click the Add button. Click OK.
Similarly, if you want to remove a website from the exclusion list, select a URL and click
Remove. Click Remove All to delete all the URLs from the exclusion list.
Click OK and then confirm your preference. Click OK.
To save your settings, click Save Changes.
Setting Restrict access to particular website
With this feature, you can block access to specific websites. This is helpful when you want to
restrict access to certain websites or if you have a shorter list of websites to restrict.
This option is also helpful when a websites does not fall in a selected category or you have
restricted a websites category yet a certain website is still accessible.
To restrict access to a particular website, follow these steps:
Open Quick Heal Total Security.
On the Quick Heal Total Security Dashboard, click Parental Control. The Parental Control
setting details screen appears.
Click a user available under Select whom to apply the settings. Users are displayed based
on the options whether you have selected Apply to all users or Apply to specific users.
On the protection rules screen, select Internet Browsing Control.
Select Restrict access to particular website and then click the Block List button.
Click the Add button.
In the Enter website text box, enter the URL of a website and then click OK. If you want to
block all subdomains of the website, select Also block subdomains.
42
Quick Heal Protection Center
For example, if you block www.abc.com and its subdomains, the subdomains such as
mail.abc.com and news.abc.com will also be blocked.
Click OK and then click OK.
To save your settings, click Save Changes.
Setting Schedule Internet access
With this feature, you can restrict your children to access Internet as per the configured time
slot only. As soon as the configured time slot is over, access to the Internet is blocked.
To set Schedule Internet access, follow these steps:
Open Quick Heal Total Security.
On the Quick Heal Total Security Dashboard, click Parental Control. The Parental Control
setting details screen appears.
Click a user available under Select whom to apply the settings. Users are displayed based
on the options whether you have selected Apply to all users or Apply to specific users.
On the protection rules screen, select Internet Browsing Control.
Select Schedule Internet access and then click the Configure button.
The Schedule internet access chart appears.
Under Specify when the user can access the Internet, select any of the following options:
Always allow access to the Internet: Select this option if you want to allow other users
the Internet access without any restriction.
Allow access to the Internet as per the schedule: Select this option if you want to set
restriction for accessing the Internet.
The day and time schedule chart is activated.
o Select the cells for the days and times during which you want to allow access to the
Internet.
The selected cells are highlighted which indicates the allowed schedule.
Click OK and then click OK.
To save your settings, click Save Changes.
Application Control
Application Control includes the following options.
43
Quick Heal Protection Center
If you want to restrict most of the applications in a category but allow certain applications in
that category, you can do so by restricting that category and enlisting such applications in the
exclusion list.
To restrict access to the categories of applications, follow these steps:
Open Quick Heal Total Security.
On the Quick Heal Total Security Dashboard, click Parental Control. The Parental Control
setting details screen appears.
Click a user available under Select whom to apply the settings. Users are displayed based
on the options whether you have selected Apply to all users or Apply to specific users.
On the protection rules screen, select Application Control.
Select Restrict access to particular categories of application and then click the Categories
button. A list of application categories appears.
Turn on an application category to allow access to the applications in that category or turn
off to deny access.
If you want to exclude certain applications from the blocked category, enlist such an
application in the exclusion list.
On the Application Category dialog, click the Exclude button.
Click the Add button and browse an application to add to the exclusion list. Click OK.
Similarly, if you want to remove an application from the exclusion list, select the
application and click Remove. Click Remove All to delete all the applications from the
exclusion list.
Click OK and then click OK.
To save your settings, click Save Changes.
The following table describes the categories.
Categories Description
CD/DVD Includes applications such as AC3 Filter, Alcohol, Alcohol 120%, AnyDVD,
Applications BlindWrite, and so on.
Chat Applications Includes applications such as Camfrog Video Chat, ManyCam, Skype,
and so on.
Download Includes applications such as Akamai Netsession, aTube Catcher,
Manager DamnVid, Download Manager Plus DownloadStudio, and so on.
Email Clients Includes applications such as FlashMail, Foxmail, Idea!, Lotus Notes
Client, Novell Groupwise, The Bat!, Thunderbird, Windows Mail, and so
on.
File Sharing Includes applications such as Ares, BearShare, BitComet, BitTorrent, and
Applications so on.
44
Quick Heal Protection Center
PC Access Control
With this feature, you can restrict your children to access your computer or laptop as per the
configured time slot only. As soon as the configured time slot is over, the computer will be
locked. However, they can log on with their credentials after the allotted time is over but for
45
Quick Heal Protection Center
forty-five seconds only. They can log in as many times as they prefer, however the computer
will be locked every forty-five seconds.
To configure PC Access Control, follow these steps:
Open Quick Heal Total Security.
On the Quick Heal Total Security Dashboard, click Parental Control. The Parental Control
setting details screen appears.
Click a user available under Select whom to apply the settings. Users are displayed based
on the options whether you have selected Apply to all users or Apply to specific users.
On the protection rules screen, select PC Access Control and then click the Configure
button. The Schedule PC access chart appears.
Under Specify when the user can access the PC, select any of the following options:
Always allow access to the PC: Select this option if you want to allow users to access
your computer without any restriction.
Allow access to PC as per the schedule: Select this option if you want to set a time-slot
for accessing the computer.
o Daily access time limit: Lets you allot time on hourly basis. Users can access the
computer for the allowed time duration at any point of time during a day.
o Daily access time-slots (clock time): Select the cells for the days and times during
which you want to allow access to the computer. Users can access the computer
only during the allowed time window.
The selected cells are highlighted which indicates the allowed schedule.
Click OK and then click OK.
To save your settings, click Save Changes.
46
Quick Heal Protection Center
Autorun Protection
The autorun feature of USB-based devices or CDs/DVDs tends to run as soon as such devices
are attached to the computer. Autorun malware may also start with the devices and spread
malware that can cause substantial harm to the computer. This feature helps you protect your
computer from autorun malware.
47
Quick Heal Protection Center
Scan External Drives does not work if Data Theft Protection is turned on, and
its option Block complete access to external drives is selected.
48
Quick Heal Protection Center
This option is available only if Quick Heal Password Protection in Settings is turned on.
Click Save Changes to save your settings.
49
Chapter
5
Quick Access Features
Quick Access Features provides quick access to some of the important features such as Scan
options and PCTuner on Dashboard itself. It also displays latest news from Quick Heal.
The Quick Heal Secure Browse shortcut icon on your desktop helps you launch your default
browser in Sandbox for secure browsing. This helps you browse securely even if you have kept
Browser Sandbox turned off. Safe Banking can be launched using the desktop shortcut icon.
Scan
The Scan options available on the Quick Heal Total Security Dashboard provide you with various
options of scanning your system based on your requirements.
You can initiate scanning of your entire system, drives, network drives, USB drives, folders or
files, certain locations and drives, memory scan, and boot time scan. Although the default
settings for manual scan are usually adequate, you can adjust the options for manual scan as
you prefer.
50
Quick Access Features
51
Quick Access Features
52
Quick Access Features
53
Quick Access Features
News
The News section displays the latest news about cyber security, virus threats and alerts and
other important information related to the computer protection. However, to get the latest
information, you must own a licensed version of the product.
54
Chapter
6
Quick Heal Menus
These menus help you configure the general settings for taking the updates automatically, and
password-protect your Quick Heal Total Security settings so that unauthorized persons cannot
change them. It also provides settings for proxy support and for setting rules for automatic
removal of reports from the list.
Settings
This feature allows you to apply various protection rules such as receiving updates from Quick
Heal as and when released, and password-protect your settings. It also allows you to set the
rule when the reports generated on all the incidents should be removed. However, the default
settings are optimum and can provide complete security to your system. We recommend that
you change the settings only when absolutely necessary.
Settings includes the following features.
55
Quick Heal Menus
While you import the settings, a caution This will overwrite all settings that you have
configured. appears. To confirm importing, click Yes.
Upon successful export or import, a message appears. Click OK to close the Import/Export
dialogue.
The settings can be imported from the same product flavor and the same version
only. For example, the settings of Quick Heal Total Security version 17.00 can be
imported to Quick Heal Total Security version 17.00 only.
The settings of the following features cannot be exported or imported:
Scheduled Scans
Password Protection
Automatic Update
This feature helps you take automatic updates of latest virus signatures. This protects your
system from the latest malware. To take the updates regularly it is recommended that you
always keep Automatic Update turned on. However, Automatic Update is turned off by default.
56
Quick Heal Menus
o Automatically download the upgrade: Select this option if you want a new upgrade
when available get downloaded automatically on your system. Then you need to
install it to upgrade your current version.
Click Save Changes to save your settings.
Internet Settings
This feature helps you turn proxy support on, set proxy type, configure IP address, and port of
the proxy for using Internet connection. If you are using a proxy server on your network, or
Socks Version 4 & 5 network, you need to enter the IP address (or domain name) and port of
the proxy, SOCKS V4 & SOCKS V5 server in the Internet settings. However, if you configure
Internet Settings, you have to enter your user name and password credentials.
The following Quick Heal Total Security modules require these changes.
Registration Wizard
Quick Update
Messenger
Registry Restore
Registry is a database used to store settings and options of Microsoft Windows operating
systems. It contains information and settings for all the hardware, software, users, and
preferences of the system.
Whenever a user makes changes to the Control Panel settings, or File Associations, System
Policies, or install new software, the changes are reflected and stored in the Registry. Malware
usually targets the system Registry to restrict specific features of the operating systems or
57
Quick Heal Menus
other applications. It may modify the system registry so that it behaves in a manner beneficial
to malware creating problem to the system.
The Quick Heal Registry Restore feature restores the critical system registry area and other
areas from the changes made by malware. It also repairs the system registry.
Self Protection
This feature helps you protect Quick Heal Total Security so that its files, folders, configurations
and registry entries configured against malware are not altered or tampered in any way. It also
protects the processes and services of Quick Heal Total Security. It is recommended that you
always keep Self Protection on. However, this option is turned on by default.
Password Protection
This feature allows you to restrict unauthorized people from modifying the Quick Heal Total
Security settings so that your security is not compromised. It is recommended that you always
keep Password Protection turned on.
58
Quick Heal Menus
To prevent access to your system by any unauthorized users, you can configure Safe Mode
Protection. Once you configure it, you need to provide a password to work in Safe Mode.
Report Settings
Reports on all activities of the Quick Heal Total Security product are generated. You can use
these reports to verify what all activities are going on such as whether your computer has been
scanned, any malware has been detected, or any blocked website has been visited.
Such reports keep on adding up in the report list. You can set the rule when these reports
should be removed automatically. The default setting for deleting reports is 30 days. You can
also retain the reports if you need them.
59
Quick Heal Menus
60
Quick Heal Menus
61
Quick Heal Menus
62
Quick Heal Menus
Once the OTP is validated on the portal, click Next on the Quick Heal Remote Device Wizard
on the desktop.
To close the wizard, click OK.
Deactivating device from RDM
If you want to activate Quick Heal Total Security on a new device while you have already
reached the maximum activation limit allowed, you need to deactivate one of your devices
from RDM. After deactivating a device, you must uninstall the product from that device also.
To deactivate a device, follow these steps:
Visit the Quick Heal RDM portal on the following website: https://mydevice.quickheal.com.
Log on to the Quick Heal RDM portal.
Select the device that you want to deactivate and click the Device Details tab.
The device details page appears with a Deactivate button on the right side.
Click Deactivate.
The selected device is deactivated.
Tools
This feature allows you to carry out various activities such as you can clean and restore your
system to its original settings, prevent access to certain drives, and diagnose the system.
Tools includes the following features.
63
Quick Heal Menus
Hijack Restore
If you have modified the default settings of Internet Explorer or if the settings have been
modified by malwares, spywares, and sometimes genuine applications, you can restore the
default settings.
This feature helps you restore the settings of Internet Explorer browser, and also of critical
operating system settings such as Registry Editor and Task Manager.
64
Quick Heal Menus
Close Helps you exit without saving the settings, from the
Important System Settings window.
The buttons on the Hijack Restore screen are as follows:
Restore Now Helps you initiate restoring the settings that you selected.
Undo Helps you undo your settings done on the current screen. If
you click the Undo button, it opens a window Undo
Operations. The settings which have been restored to
default settings will be listed. Select your settings or Check
All to select all the settings. Click OK to revert to the existing
settings.
Close Helps you exit from the Hijack Restore window without
saving your settings.
Track Cleaner
Most of the programs store the list of recently opened files in their internal format to help you
open them again for quick access. However, if a system is used by more than one user, the
user's privacy may be compromised. Track Cleaner helps you remove all the tracks of such most
recently used (MRU) programs and prevent privacy breach.
Anti-Rootkit
This feature helps you proactively detect and clean rootkits that are active in the system. This
program scans objects such as running Processes, Windows Registry, and Files and Folders for
any suspicious activity and detects the rootkits without any signatures. Anti-Rootkit detects
most of the existing rootkits and is designed to detect the upcoming rootkits and also to
provide the option to clean them.
65
Quick Heal Menus
However, it is recommended that Quick Heal Anti-Rootkit should be used by a person who has
good knowledge of the operating system or with the help of Quick Heal Technical Support
engineer. Improper usage of this program could result in unstable system.
66
Quick Heal Menus
Auto Scan Auto Scan is the default scan setting for Anti-Rootkit. Under
Auto Scan, the Quick Heal Anti-Rootkit scans the predefined
system areas such as:
Hidden Processes.
Hidden Registry entries.
Hidden Files and Folders.
Executable ADS.
Custom Scan Helps you customize the scan setting for Anti-Rootkit for the
following options:
Detect Hidden Process – scans the hidden processes
running in the system.
Detect Hidden Registry Items – scans the hidden items in
Windows Registry.
Detect Hidden files and folders – scans the hidden files and
folders in the system and executable ADS (Alternate Data
Streams). You can further choose from the following
options:
Scan drive on which operating system is installed
Scan all fixed drives
ADS (Alternate Data Streams) to scan for executable ADS.
Report File Quick Heal Anti-Rootkit creates a scan report file at the
Path location from which it is executed. However, you can
specify different location.
67
Quick Heal Menus
Take the appropriate action. You need to restart your system so that rootkit cleaning takes
place.
Tabs that appear on the Scan Results screen
Process After the scan is complete, Quick Heal Anti-Rootkit will
detect and display a list of hidden processes. You can select
the Process tab for termination, but ensure that the list of
processes does not include any known trusted process.
Quick Heal Anti-Rootkit also displays a summary of total
number of processes scanned and hidden processes
detected.
Terminating After selecting the list of processes to close, click the
Hidden Process
Terminate button. If a process is successfully terminated,
then its PID (Process Identifier) field will show n/a and
process name is appended by Terminated. All terminated
Processes will be renamed after a restart.
68
Quick Heal Menus
Queued.
69
Quick Heal Menus
Launch AntiMalware
Quick Heal AntiMalware, with its improved malware scanning engine, scans registry, files and
folders at a very high speed to thoroughly detect and clean spyware, adware, rogueware,
dialers, riskware and lots of other potential threats in your system.
70
Quick Heal Menus
71
Quick Heal Menus
72
Quick Heal Menus
Quick Heal recommends that you keep the autorun feature of your USB drive
turned off, however, if you may turn on the Autorun feature of the USB drive
following the same process as mentioned in here.
System Explorer
This tool provides you all the important information related to your computer such as running
process, installed BHOs, toolbars installed in Internet Explorer, installed ActiveX, Hosts, LSPs,
Startup Programs, Internet Explorer settings and Active network connection. This helps you
diagnose the system for any new malware or riskware.
To use system explorer, follow these steps:
Open Quick Heal Total Security.
On the Quick Heal Total Security Dashboard, click Tools.
The Tools details screen appears.
Under Diagnostic Tools, click System Explorer.
Windows Spy
This feature helps you find more information about an application or process. Sometimes we
keep getting dialog boxes or messages that are actually shown by spyware or some malware
that we are unable to locate. In such a case, this tool can be used to find out more information
about the application by dragging the target on to the dialog or window that appears on the
screen. This tool will provide following information about the dialog or a window.
73
Quick Heal Menus
Reports
Quick Heal Total Security creates and maintains a detailed report of all important activities such
as virus scan, updates details, changes in settings of the features, and so on.
The reports on the following features of Quick Heal Total Security can be viewed:
Viewing Reports
To view reports and statistics of different features, follow these steps:
Open Quick Heal Total Security.
On the Quick Heal Total Security Dashboard, click Reports.
A Reports list appears.
74
Quick Heal Menus
Button Action
Prev Helps you display the detailed report of the previous record
in the list.
This button is not available if the selected record is the first
record in the list.
Next Helps you display the detailed report of the next record in
the list. This button is not available if the selected record is
the last record in the list.
Print Helps you take the print of the detailed report.
Save As Helps you save the detailed report in .txt format in a
location of your system.
Close Helps you exit from the report details screen.
For more details about Reports, see Reports.
Help
This feature helps you access the Help topics whenever you want to know about how to use
and configure the Quick Heal Total Security features, how to seek support from the Quick Heal
Technical Support team, how to update the product, and see the license details of the product.
The Help feature includes the following options.
Help: Helps you access the in-built Help topics. On the Quick Heal Total Security Dashboard,
select Help > Help, you are redirected to the Help page where you can find topics that
describe the features of the product and how to use them. (Alternatively, press F1 key, or
click the Help button in a dialog to get to the Help page.)
Submit System Information: Helps you submit information of your system to Quick Heal for
analysis.
75
Quick Heal Menus
System Information
Quick Heal System Information is an essential tool to gather critical information of a Windows-
based system for the following cases:
To detect new This tool gathers information to detect new malwares from
Malwares the Running processes, Registry, System files like Config.Sys,
Autoexec.bat, and system and application event logs.
To get Quick Heal It gathers information of the installed version of Quick Heal
information Total Security, its configuration settings and Quarantined
76
Quick Heal Menus
file(s), if any.
77
Chapter
7
Updating Quick Heal & Cleaning Viruses
Updates for Quick Heal Total Security are released regularly on the website of Quick Heal. The
updates include information pertaining to the detection and removal of newly discovered
viruses. To prevent your system from new viruses, Quick Heal Total Security must be updated
regularly.
The default setting of Quick Heal Total Security is configured to take the updates automatically
from the Internet, without the intervention of the user. However, your system must be
connected to the Internet to get the updates regularly.
The updates can also be taken from a local or a network path, but that path should have the
latest set of definitions. This is helpful if your computer on which Quick Heal Total Security is
installed is not connected to the Internet.
Some important facts about the Quick Heal Total Security updates are:
All the Quick Heal Total Security updates are complete updates including Definition File
Update and Engine Updates.
All the security updates for Quick Heal Total Security also upgrade your version whenever
required, thus making the new features and technology available for your protection.
Quick Heal Update is a single step upgrade process.
You can update Quick Heal Total Security manually whenever necessary in any of the following
ways:
78
Updating Quick Heal & Cleaning Viruses
79
Updating Quick Heal & Cleaning Viruses
On all user computers within the network launch Quick Heal Total Security.
Under Settings, go to the Automatic Update page.
Select Pick update files from specified path.
Click Browse.
Locate the SERVER\QHUPD folder from Network Neighborhood. Alternatively you can type
the path as \\SERVER\QHUPD.
Click Save Changes to save the settings.
Cleaning Viruses
Quick Heal Total Security warns you of a virus infection when:
A virus is encountered during a manual scan.
A virus is encountered by Quick Heal Virus Protection/Email Protection.
Scanning Options
During scan , you can take any of the following actions as per requirement.
Action Tab Displays the action taken on the files.
Skip Folder Helps you avoid scanning the current folder. Scanning
moves to other location. This option is useful while scanning
a folder which contains non-suspicious items.
Skip File Helps you avoid scanning the current file. This option is
useful while scanning an archive of a large number of files.
Stop Helps you stop the scanning process.
Close Helps you exit from the scanning process.
Shut down PC Helps you shut down your system after finishing the scan.
when finished This feature will work only when the scan is complete.
80
Updating Quick Heal & Cleaning Viruses
including NTFS partitions before the desktop is completely loaded. It will detect and clean even
the most typical Rootkits, spywares, special purpose Trojans, and loggers.
Restart required during cleaning for some malwares
Some malwares drop and inject their dynamic link libraries in the running processes of the
system such as explorer.exe, Iexplore.exe, and svchost.exe. which cannot be disabled or
cleaned. During memory scan when they are detected, they will be set for deletion in the next
boot automatically. Memory scan in Quick Heal Total Security will provide details or action
recommendation for you in such cases.
Cleaning of Boot/Partition viruses
If memory scanner in Quick Heal Total Security detects a boot or partition virus in your system,
it will recommend you to boot your system using a clean bootable disk. It will scan and clean
the virus using the Quick Heal Emergency disk.
Responding to virus found alerts from Virus Protection
Virus Protection of Quick Heal Total Security continuously scans your system for viruses in the
background as you work. By default, Virus Protection repairs the infected files automatically.
You will also get a prompt after the action is taken by Virus Protection.
81
Chapter
8
Quick Heal PCTuner
Quick Heal PCTuner is a tool that helps you maintain peak performance of your computer and
protects your privacy by eliminating the Internet traces. Regular usage of PCTuner ensures
optimal performance for your system.
Menu Feature
Dashboard Displays the current status of the system.
Tuneup Helps you clean up system clutter such as junk files, invalid
registry entries, and browsing history.
Tools Contains tools to securely delete files from the hard drive.
Reports Provides reports for various tune-up activities performed.
Restore Restores the items deleted during tuneup.
About Provides information about the software and support
information.
Help Includes Help topics. Alternatively, you may press F1 to view
the Help topics.
82
Quick Heal PCTuner
Status
This feature provides the current status of your system about certain tuneup activities of
PCTuner with the help of a status meter. The tune-up activities include the following features:
Disk Cleanup
Registry Cleanup
Traces Cleanup
Defragmenter
The pointer of status meter points to the dark green region only if you perform all the tune-up
activities periodically. The Status feature also provides the status of tune-up activities in the
following format.
83
Quick Heal PCTuner
Tune-up Activity The name of the Tuneup activity (Disk Cleanup, Registry
Cleanup, Traces Cleanup, and Defragmenter).
Last Performed The last execution date of each of the Tuneup activities. If
the concerned Tuneup activity has never been executed,
then the result will be NEVER.
The third column includes a symbol against each Tuneup
activity. If the symbol is then it means that the
corresponding tuneup activity has never been performed, or
it means that the corresponding tuneup activity has not
been performed in the past 15 days. If the symbol in the
third column is , it means that the corresponding activity
has been performed in the past 15 days.
Tuneup Now Select Advanced mode if you want to customize the
button scanning behavior. This is ideal for experienced users only. If
you select this option, the Configure button is activated.
When you schedule Defragmenter, the message Defragmenter has been set to run
on next boot is displayed.
Tuneup
This feature cleans up system clutter such as invalid and unwanted junk files, invalid registry
entries, traces of the Internet history, and so on. Tuneup includes the following options.
Auto Tuneup
Auto Tuneup performs Disk Cleanup, Registry Cleanup, Traces Cleanup, and Defragmenter. It
is ideal for novice users, and for users who do not want to waste time by performing individual
Cleanup activity. Only the items deleted by Disk Cleanup and Registry Cleanup can be
recovered.
84
Quick Heal PCTuner
Take backup before deleting is selected by default. If this option is not selected, Auto
Tuneup will delete all the items without taking the backup. We recommend that you keep it
selected.
Click Apply to save the new settings.
Click Close to exit without saving the settings.
Disk Cleanup
Disk Cleanup finds and removes invalid and unwanted junk files from the hard disk drive. These
files consume hard disk space and also slow down the system considerably. Disk Cleanup
deletes these files freeing up space and helps in improving system performance. The Disk
Cleanup feature also deletes temporary files, Internet cache files, improper shortcut files,
garbage name files, and empty folders.
85
Quick Heal PCTuner
Registry Cleanup
This feature removes invalid and obsolete registry entries from the system that appear due to
improper un-install or non-existent fonts. Sometimes during uninstallation, the registry entries
are not deleted. This results in slower performance of the system. This feature removes such
invalid registry entries to boost the performance of system.
Traces Cleanup
This feature removes traces from the Internet history and MRU (Most Recently Used) list of
various applications. It safely deletes history, cleans the cookies, cache, auto-complete forms
and passwords. Traces such as auto complete entries and saved passwords need to be deleted
to ensure that user privacy is not breached. It also erases the traces from popular application
programs such as Microsoft Office applications, Adobe Acrobat Reader, Media Player, WinZip,
WinRAR and traces such as Browser Cookies, and Saved Passwords.
86
Quick Heal PCTuner
Click Settings if you want to Customize Traces Cleanup as mentioned in the previous
section.
Click Start.
A list with applications containing traces appears.
You may click Stop to halt the entries being added to the list.
Each application containing traces will be preceded by a check box. All applications
containing traces are selected by default.
Clear the applications that need to be skipped by Traces Cleanup.
There are two other fields that display the following information:
Total Items Found: The total number of applications containing traces found by Traces
Cleanup.
Items Selected: The total number of application containing traces selected for removal.
Click Clean Items to remove traces from the applications listed.
Click Close to exit Traces Cleanup.
Defragmenter
This feature defragments vital files, such as page files and registry hives for improving the
performance of the system. Files are often stored in different locations that slow down system
performance. Defragmenter reduces the number of fragments and clubs all the fragments into
one contiguous chunk to improve system performance.
Using Defragmenter
To defragment page files and registry hives, follow these steps:
Select Tuneup > Defragmenter.
Two options for defragment appear: Enable defragmentation and Cancel defragmentation.
Cancel defragmentation is selected by default.
Select Defragment at next boot to perform defragmentation the next time you start the
system; else select Defragment at every boot to perform defragmentation every time you
start the system.
Defragment system paging file (Virtual Memory) and Defragment Windows Registry are
not selected by default. You can select any of these two or both for the Defragmenter to
perform. We recommend that you keep these options selected.
Click the Apply button to save these settings, or else click Close to exit without saving.
Scheduler
This feature helps you schedule the Tuneup activity periodically as per your requirements. You
can configure the Tuneup schedule to perform Disc Cleanup, Registry Cleanup, Traces Cleanup,
87
Quick Heal PCTuner
and Defragmenter. You can create a task and schedule it. The task is performed in the
background at the time you specify when you created the task. You can see the details of the
tasks performed in the Scheduler Reports.
Customizing Scheduler
You can customize Scheduler to perform at your convenient time. However, Defragmenter can
be scheduled only at next boot. To customize Scheduler, follow these steps:
Select Tuneup > Scheduler.
A list of tasks is displayed along with details such as Task Name, Frequency, Activity, Backup,
and Delete oldest backup.
There are three options that you can select while you schedule tuneup activity:
i. New – to configure any new task
ii. Edit – to edit any existing task
iii. Remove – to remove the already scheduled task
To schedule a new tuneup activity, click New.
The Configure Tuneup Schedule screen appears.
Enter Task Name, Frequency, and Start At details.
Each Tuneup activity in the screen is preceded by a check box. All items are selected in the
list by default.
Clear the items that need to be skipped by Scheduler feature.
Take backup before cleaning is selected by default. If this option is not selected, cleaning
will be done without taking the backup. We recommend that you keep it selected. Delete
oldest backup if maximum backup limit exceeds will delete the oldest backup when the
limit of backup is surpassed.
Enter User Name and Password.
Click Apply to save the new settings or else click Close to exit without saving the settings.
In case you keep Delete oldest backup if maximum backup limit exceeds not
selected, Scheduler will not perform when the backup limit is surpassed.
Settings
This feature helps you customize Disk Settings, Registry Settings, and Traces Settings as per
your requirements.
88
Quick Heal PCTuner
89
Quick Heal PCTuner
Tools
This feature helps you delete duplicate files from the system. It offers secure deletion where
files are deleted permanently and will not be recovered even if recovery software is used. The
Tools menu includes the following options.
90
Quick Heal PCTuner
Click the Apply button to save the modification of settings or else click the Close button to
exit without saving any modified settings.
Click Add Path to add the path for Duplicate File Finder to search for duplicate files.
The Browse for folder window appears.
Browse for the required folder. Select Exclude sub-folder if you want to exclude the sub-
folders within the folder in the scan. Exclude sub-folder option is not selected by default.
Click OK after selecting the required path. If the added path is incorrect, select that path
and click Clear to delete the path. Click Clear All to delete all the added paths from the list.
Click Start Search.
A list of the file locations with duplicate file locations is displayed. The information of the
scan is provided in the following fields.
Search Progress: Displays the progress of the search.
Folders Scanned: Displays the number of folders scanned.
Files Scanned: Displays the number of files scanned.
Duplicates Found: Displays the number of files with duplicates found.
Space Wasted: Displays the space that was consumed by the duplicate files.
Click Check All to select all the duplicate files within the expanded originals.
Click Delete to delete all the duplicate files.
Click Close to exit from the Tools menu.
Secure Delete
This feature is used for deleting unwanted files or folders completely from the system. In case
you want to delete any confidential data, Secure Delete helps you delete the data making it
absolutely impossible to recover by any means. Data deleted using the Delete function of
Windows can be recovered using a Recovery Software as the link to such data remains in the
cluster of hard drives. The Secure Delete feature of Quick Heal PCTuner deletes the file or
folders directly from the hard drive making it unrecoverable even if a Recovery Software is
used.
Deletion Methods
The following are the three file deletion methods available in Quick Heal PCTuner.
One Pass Random One Pass Random deletion method uses random letters to
– Quick Data overwrite the data. This method of deletion is quick and
Destruction quite secure. Data once deleted cannot be recovered. This is
the best option for most users. This is also the default file
deletion method.
Two Pass – More Two Pass deletion method uses twice the number of
91
Quick Heal PCTuner
Startup Booster
This tool removes unwanted startup programs from the system. It removes all the unnecessary
applications from the Registry Run and Startup, and enhances the startup speed of the system.
Using Startup Booster
To use Startup Booster, follow these steps:
Select Tools > Startup Booster.
Click Start Search.
The applications that automatically load themselves during startup are displayed in a list.
Each application is preceded by a check box. No applications are selected by default.
92
Quick Heal PCTuner
Select the applications that need to be removed from loading every time your system starts.
Click Remove to remove the application from the list or else click Close to exit.
Service Optimizer
Your computer may have many unwanted services that run at startup, consuming CPU and
memory that can potentially slow down your system performance. Service Optimizer analyzes
your system and suggests services that can be safely disabled to run at startup based on your
answers to the related services.
The following are the services available for Service Optimizer in Quick Heal PCTuner.
Network related Services
System related Services
Performance related Services
Security related Services
Using Service Optimizer
To use Service Optimizer, follow these steps:
Select Tools > Service Optimizer.
The services are categorized in four sections represented by four Tabs: Network, System,
Performance, and Security.
Select the service and select the relevant answer to the questions in each section.
Every time you open Service Optimizer, the Apply button appears dimmed. However, on
changing any of the answers, like if you select either YES or NO, the Apply button is
activated.
Click the Apply button to optimize the service or else click Close to exit without saving.
You get a Service Optimization Summary if you have optimized any service. Click View
Report to view the detailed report or else click Close to exit.
If the answers related to the services do not require any change, a message
appears.
If you click the Default button, all the optimized services are reverted to
their original status.
Reports
This menu contains reports for various activities performed by Quick Heal PCTuner. It includes
several menu items. Each menu item corresponds to the report of a particular activity.
93
Quick Heal PCTuner
Button Action
Details Helps you display a detailed report of the selected record in
the list.
Delete All Helps you delete all the reports in the list.
Delete Helps you delete the selected record in the list.
Close Helps you exit from the Reports menu.
If you click the Details button in any menu item, a window titled Report opens. This includes
five more buttons whose actions are common to all the menu items that are as follows:
Button Action
Prev Helps you display the detailed report of the previous record
in the list.
Next Helps you display the detailed report of the next record in
the list.
Print Helps you take out the print of the detailed report.
Save As Helps you save the detailed report in text format on your
system.
Close Helps you exit from the Report window.
94
Quick Heal PCTuner
The Report window appears that includes the detailed report for the selected record.
Scheduler Reports
This feature includes a list of records with a detailed report on all the Scheduled tasks
performed on the system. To view Scheduler Reports, follow these steps:
Select Reports > Scheduler.
Select the required record in the list.
Click the Details button.
The Report window appears that includes the detailed report for the selected record.
95
Quick Heal PCTuner
Restore Reports
This feature includes a list of records (with a detailed report on the Restore feature performed
on the system. To view Restore Reports, follow these steps:
Select Reports > Restore.
Select the required record in the list.
Click the Details button.
The Report window appears that includes the detailed report for the selected record.
96
Quick Heal PCTuner
Restore
This feature restores the items to its original locations that were deleted by any of the Disk
Cleanup, Registry Cleanup, and Startup Booster features. However, it does not restore the
items deleted by Traces Cleanup.
If Delete items without taking backup is not selected during Disk Cleanup or
Registry Cleanup, backup will not be taken. In case of Auto Tuneup, Take backup
before deleting the Files should be selected to take the backup and restore the
files when needed.
The Restore Points area lists out tune-up activities that can be restored. The actions that can be
performed on the Restore Points are as follows.
Restoring Reports
To restore, follow these steps:
Select the required restore point.
Click the Restore button.
A message box appears with the following prompt: Are you sure you want to restore the
backup? Click Yes if you want to restore the backup or else click No if you do not want to
restore the backup.
If you have clicked Yes in the previous step, the backup is restored and a message The
selected backup was restored successfully appears. Click OK to complete the restore
process.
Deleting Reports
To delete any of the restore points in the list, follow these steps:
Select the required restore point.
Click the Delete button.
A message appears with the following prompt: Are you sure you want to delete it? Click OK
if you want to delete the restore point or else click Cancel to exit without deleting.
97
Chapter
9
Technical Support
Quick Heal provides extensive technical support for the registered users. It is recommended
that you have all the necessary details with you during the email or call to receive efficient
support from the Quick Heal support executives.
The Support option includes FAQ (Frequently Asked Questions) where you can find answers to
the most frequently asked questions, submit your queries, send emails about your queries or
call us directly.
To see the support options, follow these steps:
Open Quick Heal Total Security.
On the Quick Heal Total Security Dashboard, select Help > Support.
Support includes the following options.
Web Support: Includes Visit FAQ (Frequently Asked Questions) and Visit Forums – where
you can submit your queries to get an appropriate answer.
Email Support: Includes Submit Ticket that redirects you to our Support webpage. Here you
can read some of the most common issues with answers. If you do not find an answer to
your issue you submit a ticket.
Live Chat Support: Using this option, you can chat with our support executives.
Phone Support: Includes phone numbers. You can call our support team and get your issues
resolved.
Remote Support: This support module helps us easily connect to your computer system
remotely and assist you in resolving technical issues.
Support by Phone
For customers based in India, dial Toll Free number: 1800-121-7377.
For customers outside India, please visit www.quickheal.com/contact_support.
Other Sources of Support
To get other sources of support, please visit www.quickheal.com/support-center-faqs.
98
Technical Support
99
Index
B Q
Browser Sandbox, 36
Quarantine & Backup, 26
Browsing Protection, 34
C R
Registration
Cleaning Viruses, 80
online, 6
Renewal
D online, 7
Data Theft Protection, 48
DNA Scan, 18 S
Scan
E External Drives, 48
Scan Schedule, 22
Email Protection, 27
Scan Settings, 14
Spam Protection, 29
P
Parental Control, 40 V
Password Protection, 58
Virus Protection, 17
Phishing Protection, 36
100