This list includes protection components designed to protect against various types of digital threats.
Each type of threat is handled by a dedicated protection component. Components can be enabled or disabled independently of one another, and their settings can be configured.