skip to main content
Manage Alerts
Complete the following steps to manage alerts:
 
1. Click Manage Alerts.
2. Click on the Tag field and enter a tag. Select Exclude Computers from These Tags if needed, and then click OK.
If you add a Tag, the Alert will be generated only for the computers that have (or do not have) the particular Tag. If you want all the computers to be included in the Alert, do not add any Tags.
3. Select Notification or Email for the following Alerts:
> Active protection is disabled – Active Protection (AP) is a real-time method for detecting malware. AP sits quietly in the background as you work or browse the internet, constantly monitoring files that are executed (run) without causing noticeable strain to your system.
> Firewall protection is disabled – Firewall provides bi-directional protection, protecting you from both incoming and outgoing traffic. A firewall protects your network from unauthorized intrusion.
> Virus definitions are outdated – Definitions (often called threat definitions) are the basis that an anti-virus or anti-spyware tools uses to compare against when protecting you from all sorts of malware, whether by scans, email protection, or real time protection.
> Virus is detected – The object is a legitimate file infected by a virus. Sometimes the infected file can be disinfected, and the legitimate file can be provided to the end user. However, not all types of infection can be disinfected – for example, the whole Trojan category cannot be disinfected. An important characteristic of a virus is that the virus replicates itself, ensuring its continuous spread. No other threat type replicates itself.
> Spyware is detected – Spyware is a large class of malicious applications with a huge range of malicious activity. This category includes applications which steal password and credit card information, online game account passwords, provide false security alerts giving the impression that the user's machine is in a critical state and demanding money for fixes, and so on. Usually, spyware gets installed without the user's informed consent.
> Adware is detected – Adware is a class of malicious applications designed to display advertisements on the user's desktop, or in the web browser. Adware is also often used to monitor and report user browsing habits to the advertiser to bring more relevant ads. Some free applications available on the Web contain the adware payload, which is usually installed with user consent, while some other adware applications are installed without user consent.
> Dialer is detected – Dialers are applications which use the modem connected to the computer to dial premium-rate numbers. Usually they call either local pay-per-minute numbers or international numbers; per-minute costs have been known to reach several hundreds of dollars. Even if installed with user consent, they usually do not provide information about the real cost of the call.
> Malicious App is detected – The object is an application which is often installed and used for malicious purposes by third parties. While the application itself is not malicious, experience shows that it poses a higher probability (compared to others) to be used for malicious purposes and being installed without user consent. This category includes web or socks proxies, remote administration software and other types of software.
4. Click Done.