Configuring

Written By Marissa Fegan (Super Administrator)

Updated at September 5th, 2025

Table of Contents

Is a real-time method for detecting . sits quietly in the background as you work or browse the Internet, constantly monitoring files that are executed (run), without causing noticeable strain to your computer system.

When using, ensure that there is no other real-time protection software running. If there is another real-time software running, the two programs running together may cause a noticeable decrease in system performance.

 

When detects a threat, a notification displays alerting you that a malware threat was blocked.

To set and configure :

  1. Click , then Antivirus.
  2. Switch on . If you switch it off, malicious files will not be stopped in real time. It will look at any file when it is accessed (by you or malicious software).
  3. Check Block potentially malicious processes to have actively scan system processes for malicious intent. If you select this option, you must choose whether favors performance or security.
    • Malcious Script Protection: Protects your device from malicious scripts by intercepting and scanning the command line; use the checkbox to enable or disable this feature
  4. Check Look inside archives for to dig into compressed files on the fly.

    Note: Enabling this option may cause a small slowdown.

     
  5. Check Do not show notification pop-up when a threat is blocked if you want to silently handle malware threats. Uncheck it if you want notifications.
  6. Switch on Handle Threats Automatically to have scans automatically take care of any malware found. Switch it off if you want more control over how handles malicious files.
  7. Switch on Include low-risk programs to include low-risk programs. This option applies to all scan types and .