After having removed threats occasionally over the last couple years, in the last week or two my Webroot has remved a single threat every time it has run, which is daily. How do I tell whether that is a recurrent threat, or one not successfully removed by Webroot?
Page 1 / 1
Hello Rebwoot,
Welcome to the Webroot Community,
Please have a look here at this KB Article. https://community.webroot.com/t5/Webroot-SecureAnywhere-Antivirus/PC-Threats-Removed-Stats/ta-p/169855
Hope this helps?
Welcome to the Webroot Community,
Please have a look here at this KB Article. https://community.webroot.com/t5/Webroot-SecureAnywhere-Antivirus/PC-Threats-Removed-Stats/ta-p/169855
Hope this helps?
Hi Rebwoot
Welcome to the Community Forums.
If I may suggest a different tack to that from Sherry? You can also review the Threat Log, for details of what has been detected, when, etc. To do this click on the gear/cog symbol to the right of the Utilities tab in the main app panel. The click on the 'Reports' tab and once that has opened click on the 'Save threat log' button to be found on the left hand side of the next panel.
That will open up a new window asking you for a name for the saving of the threat log and a location to save it to. Once you have entered the details and cllicked on 'Save' the threat log details will be present (as well as being saved) in the default text editor for your system.
From there you can scan for and investigate threat details as well as copying & pasting the details into other repositories.
I hope that this is also helpful?
Regards, Baldrick
Welcome to the Community Forums.
If I may suggest a different tack to that from Sherry? You can also review the Threat Log, for details of what has been detected, when, etc. To do this click on the gear/cog symbol to the right of the Utilities tab in the main app panel. The click on the 'Reports' tab and once that has opened click on the 'Save threat log' button to be found on the left hand side of the next panel.
That will open up a new window asking you for a name for the saving of the threat log and a location to save it to. Once you have entered the details and cllicked on 'Save' the threat log details will be present (as well as being saved) in the default text editor for your system.
From there you can scan for and investigate threat details as well as copying & pasting the details into other repositories.
I hope that this is also helpful?
Regards, Baldrick
Reply
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.