Jump to content
Sign in to follow this  
TNRoadHog44

Removal Actions

Recommended Posts

I do not understand how to use the log file that is generated after the scan is complete. When I review the file that is generated and then access the "Explain Dectected Item" online the answer that I recieve is practically useless as it provides no specific action. An answer such as "Listed below is basic information about the detected application/process. This application may not be safe to have on your system" does not tell me what to do with the problem, delete it,quarantine it or keep it.

I purchased your program to provide me with answers but I cannot find them. If I arbitrarily delete all items in the log I usually end up with an inoperativesystem. How do I determine the action necessary? What am I missing?

Additionally how does Real Time Protection work to protect me when the program cannot provide an answer as to the disposition of the items in question?

Share this post


Link to post
Share on other sites

I do not understand how to use the log file that is generated after the scan is complete. When I review the file that is generated and then access the "Explain Dectected Item" online the answer that I recieve is practically useless as it provides no specific action. An answer such as "Listed below is basic information about the detected application/process. This application may not be safe to have on your system" does not tell me what to do with the problem, delete it,quarantine it or keep it.

I purchased your program to provide me with answers but I cannot find them. If I arbitrarily delete all items in the log I usually end up with an inoperativesystem. How do I determine the action necessary? What am I missing?

Additionally how does Real Time Protection work to protect me when the program cannot provide an answer as to the disposition of the items in question?

Our product is designed to detect and remove threats found on your system - it's not designed as a research tool - meaning we don't spend the time doing large write-ups on threats - we spend the time finding and removing them :)

Share this post


Link to post
Share on other sites

I do not understand how to use the log file that is generated after the scan is complete. When I review the file that is generated and then access the "Explain Dectected Item" online the answer that I recieve is practically useless as it provides no specific action. An answer such as "Listed below is basic information about the detected application/process. This application may not be safe to have on your system" does not tell me what to do with the problem, delete it,quarantine it or keep it.

I purchased your program to provide me with answers but I cannot find them. If I arbitrarily delete all items in the log I usually end up with an inoperativesystem. How do I determine the action necessary? What am I missing?

Additionally how does Real Time Protection work to protect me when the program cannot provide an answer as to the disposition of the items in question?

Our product is designed to detect and remove threats found on your system - it's not designed as a research tool - meaning we don't spend the time doing large write-ups on threats - we spend the time finding and removing them

You do not understand my question.

Share this post


Link to post
Share on other sites

Hello.

As stated, SAS is designed to detect and remove infections, not to educate people on what may or not be an infection. No antimalware can effectively address your concern. The time and money involved in such would be extremely prohibitive. In addition, the descriptions would have to be constantly monitored, researched, and updated. Like SAS, some antimalware programs will give some sort of description, but it's up to the end user to Google the file if they're not sure about it. Alternatively, you can post the file here if you're unsure.

To answer your second question, Real time protection will block threats before running, at which point SAS will prompt you to run a scan. Following that, see my previous paragraph :-)

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×