Step 13. Analyzing the system

At this stage, information about Microsoft Windows applications is collected. These applications are added to the list of trusted applications which have no restrictions imposed on the actions they perform in respect of the system.

Once the analysis is complete, the Wizard will proceed automatically to the next step.

Internet Security arr Step 13. Analyzing the systemPage top

Step 13. Analyzing the system