Managing Protected Applications

You can provide additional security for software applications that may contain confidential information, such as Instant Messaging clients or tax preparation software. By protecting these applications, you secure them against information-stealing Trojans like keyloggers, man-in-the-middle attacks, and clipboard stealers. You can add any applications to the Protected Applications list and assign them to one of the following protection levels:

  • Protect — Protected applications are secured against information-stealing malware, but also have full access to data on the system. You might want to add financial management software to the category. When you run a protected application, the Webroot icon in the system tray displays a padlock:



  • Allow — Allowed applications are not secured against information-stealing malware, and also have full access to protected data on the system. Many applications unintentionally access protected screen contents or keyboard data without malicious intent when running in the background. If you trust an application that is currently marked as Deny, you can change it to Allow.
  • Deny — Denied applications cannot view or capture protected data on the system, but can otherwise run normally.
As you work on your computer, SecureAnywhere automatically adds web browsers to the Protected Applications list and assigns them to the protected status.

To manage protected applications:

  1. From the system tray, double-click the Webroot icon. 



    The main interface displays.

     

  2. Click the Identity Protection gear icon.
  3. Click the Application Protection tab.



  4. In the row for the application you want to modify, click one of the following radio buttons:
    • Protect
    • Allow
    • Deny
    Note the following:
    • The grey button indicates the level or protection is enabled.
    • The white button indicates the level of protection is disabled.
  5. To include another application in this list, click Add Application, then select an executable file.