If SecureAnywhere detects a threat or suspicious file, it prompts you to manage the item. Follow this procedure on how to manage any threats to your system.
To manage detected threats:
In the Results panel, review the list of file names.
Do either of the following:
Keep the checkboxes selected, so items will be moved to quarantine.
Deslect any checkbox for which you recognize a filename and know that you need it to run an application.
For any items you deselect, SecureAnywhere restores them to their original locations.
Do not restore a file unless you are absolutely sure it is legitimate.
On the bottom right of the window, click the Next button.
We recommend that you click the Next button to move all items to quarantine, where they are rendered inoperable. If you determine later that you need a file, you can restore it to its original location.
On the Next Steps panel, click the Begin Threat Removal button.SecureAnywhere runs a follow-up scan again to make sure all threat traces are removed. If you cancel the scan, the main panel remains in a Threats Detected state and prompts you to run a scan.