Related Items:
WSS Getting Started User Guide
Webroot DWP Configuration Guide
Guide Sections:
Enabling or Disabling Malware Protection
You enable or disable full protection from malware using the Malware Protection subtab.
Note: To enter settings, you must have the Malware Protection permission for Manage Policy.
Full threat protection is based on continuously updated, industry-wide research on sites with reputation ratings. Generally, the higher the ratings, the higher the risk. If you are unsure of a particular URL's level, see Determining a URL's Classification. Full Threat Protection blocks all malware types that fall into these categories:
Adware | A type of software that displays advertisements on your system. Some adware might also hijack web searches, meaning that it might reroute your web searches to its own web page. It might change your default home page to a specific web site. Adware generally propagates itself using dialog boxes, various social engineering methods, or through scripting errors. |
Malware Behavior | Encrypted malware that is difficult to detect, but identified if the code is analyzed before it executes. Heuristic methods are used to scan and determine the code's behavior. |
Potentially Unwanted Programs | A program that might change the security or privacy state of your computer and online activities. These programs can (but do not necessarily) collect information about your online activities and send it to a third party without your knowledge or consent. A potentially unwanted program might arrive bundled with freeware or shareware, various social engineering methods, or by someone with access to your computer. |
Suspicious Behavior | An example of suspicious behavior is if a program tries to write data to an executable. Blocking suspicious behavior protects against zero-hour viruses (new viruses whose definitions have not yet been recorded). This method can lead to false positives. |
Suspicious Destination | Category used for a virus that is harmless until a given date arrives. On this date (sometimes called April First), when the malicious program is executed, it accesses sites to download malware. Occurrences are rare, but if they do happen, access to those sites is blocked. |
System Monitors | System monitors, typically non-commercial programs, might monitor and capture your computer activity, including recording all keystrokes, emails, chat room dialogue, instant message dialogue, websites visited, usernames, passwords, and programs run. This type of program might be capable of taking screen shots of your desktop at scheduled intervals and storing the information about your computer in an encrypted log file for later retrieval. These log files might be sent to a pre-defined email address. A system monitor can run in the background, hiding its presence. |
Trojans (also called Trojan Horse Virus) | A Trojan horse might take control of your computer files by using a program manager that allows a hacker to install, execute, open, or close programs. The hacker can gain remote control of your cursor and keyboard and can even send mass emails from your infected computer. It can run in the background, hiding its presence. A Trojan is usually disguised as a harmless software program and might also be distributed as an email attachment. Opening the program or attachment might cause an auto-installation process that loads the downloader onto your computer and download third-party programs on your computer, resulting in the installation of unwanted programs without your knowledge or consent, and jeopardizing your privacy. Trojans can also open a port on your computer that enables a hacker to gain remote control of your computer. |
Viruses | A virus is a self-replicating program that can infest computer code, documents, or applications. While some viruses are purposefully malignant, others are more of a nuisance, replicating uncontrollably and slowing down system performance. |
Custom Heuristics | Malware detected by a proprietary, vendor-supplied scanning methodology that is non-signature based. This setting offers protection within the zero-hour period of a new virus outbreak. |
To enable malware protection:
Note: If a user attempts to upload malicious traffic, the Web Security Service displays a block page. Some browser applications, however, display their own error page if the blocking occurs.
Hosting Services | Customer Support | Additional Resources |
© 2017 Windstream Communications. All Rights Reserved. Privacy | Terms of Use | Hosting Policy | Legal Notices | Acceptable Use Policy | Digital Content License Agreement |