How to find this setting:
Keep your computer protected
Your security software analyzes basic information about every file that you open, save, or download. For threats like viruses, it attempts to remove the threat from the infected file. If unable to remove the threat, it deletes the infected file along with the threat.
Select Scan for threats when opening, saving, or
downloading suspicious files to detect and eliminate security threats
automatically.
Maximize your protection
Your security software can search for threats in files and settings as well as check for suspicious behavior on your computer.
Option |
Description |
---|---|
Enable real-time scanning for compressed files (like ZIP files) |
Checks files reduced in size through data compression techniques. Such files commonly end with the ZIP or RAR extension and require a specific program to "unpack," "unzip," or "decompress" the contents. |
Enable machine-learning to protect from new or unknown threats |
Uses advanced machine learning technology to correlate threat information and perform in-depth file analysis to detect and protect against new and unknown security risks. |
Check if programs try to make unauthorized changes to system settings that could threaten your security |
Blocks suspicious changes to the computer. Such changes can result in web browser hijackings, unwanted, but unremovable, web browser toolbars, or reduced computer performance, among other problems. |
Prevent programs on portable drives from launching automatically |
Blocks programs that try to start running without your permission when you plug a USB drive into the computer. Flash memory or other portable USB drives rarely include certain kinds of programs that launch automatically, so they usually represent a threat if found. |
Immediately close programs that have been exploited by hackers |
Stops programs known to help with attacks and shows an alert to announce what happened. |
Protect documents against unauthorized encryption or modification |
Blocks suspicious changes to your documents that might lock you out for the purpose of extortion. |
Scan for suspicious files as the computer starts |
For computers running Microsoft Windows 8 or above, your Trend Micro security software can start checking for threats as the operating system starts to get a jump on any malicious software that has infected fundamental Windows components. |
Automatically delete files that show any signs of a threat |
Gets rid of any file that might cause trouble. This aggressive response could remove some harmless files along with the unsafe ones, so consider using this protection only when receiving files or installing programs that seem risky. |
Automatically delete potentially unwanted applications |
Removes additional programs that may have been included with the software you wanted to install. These unwanted programs may contain potential threats, slow down your computer's performance, or monitor your Internet activities. |
Automatically delete joke programs |
Removes relatively harmless programs that neither cause damage nor spread automatically, but which do annoy some people. |
Display a warning after detecting viruses, spyware, or suspicious behavior |
Provides a notification when a threat is detected, quarantined, or removed, or when programs on the computer behave in a suspicious manner. |
Your security software takes a balanced approach to detecting threats. You can override this automatic system to select a Normal protection level, which helps avoid false positive identifications of malicious software. Selecting a Hypersensitive protection level makes sense if viruses or spyware have already taken up residence on your computer. In general, you can just let your security software switch between these protection levels automatically.
Stay informed when something important happens
Important warnings appear when your security software deals with a threat.
Select Display a warning after detecting viruses, spyware, or suspicious
behavior to make sure you see these messages.