Configuring System Watcher

You can perform the following actions for configuring System Watcher:

In this section:

Enable or disable exploit protection

Choose action in the event malicious activity is detected in a program

Enabling and disabling rollback of malware actions during disinfection

Page top