I do not understand how to use the log file that is generated after the scan is complete. When I review the file that is generated and then access the "Explain Dectected Item" online the answer that I recieve is practically useless as it provides no specific action. An answer such as "Listed below is basic information about the detected application/process. This application may not be safe to have on your system" does not tell me what to do with the problem, delete it,quarantine it or keep it.
I purchased your program to provide me with answers but I cannot find them. If I arbitrarily delete all items in the log I usually end up with an inoperativesystem. How do I determine the action necessary? What am I missing?
Additionally how does Real Time Protection work to protect me when the program cannot provide an answer as to the disposition of the items in question?
Our product is designed to detect and remove threats found on your system - it's not designed as a research tool - meaning we don't spend the time doing large write-ups on threats - we spend the time finding and removing them
You do not understand my question.