Configuring System Watcher
Configuring System Watcher
You can perform the following actions for configuring System Watcher:
- enable or disable exploit protection;
- choose action should malicious activity be detected in a program;
- Enable or disable rollback of malware actions during disinfection.
Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.