Step 13. Analyzing the system
At this stage, information about Microsoft Windows applications is collected. These applications are added to the list of trusted applications which have no restrictions imposed on the actions they perform in respect of the system.
Once the analysis is complete, the Wizard will proceed automatically to the next step.