If SecureAnywhere detects a threat or suspicious file, it prompts you to manage the item. Follow this procedure on how to manage any threats to your system.
To manage detected threats:
In the Results panel, review the list of file names.
Do either of the following:
Keep the checkboxes selected, so items will be moved to quarantine.
Deslect any checkbox for which you recognize a filename and know that you need it to run an application.
For any items you deselect, SecureAnywhere restores them to their original locations.
Note:
Do not restore a file unless you are absolutely sure it is legitimate.
On the bottom right of the window, click the Next button.
Note:
We recommend that you click the Next button to move all items to quarantine, where they are rendered inoperable. If you determine later that you need a file, you can restore it to its original location.
On the Next Steps panel, click the Begin Threat Removal button.SecureAnywhere runs a follow-up scan again to make sure all threat traces are removed. If you cancel the scan, the main panel remains in a Threats Detected state and prompts you to run a scan.