To access the advanced settings, click Settings/Add profile/Windows and Linux/Advanced settings.
Here you can configure aspects related to the installation of the protection on computers, as well as the connection of these computers to the Internet and to the servers. You can also configure options related to the suspicious file quarantine.
Indicate in which directory you want to install the protection. will show a default path, which you can change if you want.
In this section you can also indicate if you want to automatically uninstall any competitor products detected on the computers or if you want both products to coexist on the same computers.
For more information about the default behavior for the different versions of the protection (trial or commercial version), click here.
On Linux computers, the protection is installed in a default folder that cannot be changed.
Administrators can disable scans with Collective Intelligence. It is advisable to keep this option enabled if you want to benefit from all the protection provided by Collective Intelligence.
On Linux computers it is not possible to disable the connection to Collective Intelligence. Therefore, as long as the computer is connected to the Internet, the protection installed will take full advantage of Collective Intelligence.
Establish how often you want the computer to send information to the servers about the status of the protection installed.
You can change the frequency displayed by default, but it must be a value between 12 and 24 hours.
You can also specify the computer through which connections with the server are centralized.
To do this, select the relevant checkbox and click Select. In the Select computer window, choose a computer or search for it using the Find button. Then click OK.
To check the necessary requirements of the computer used to establish connections with the server, click here.
Files in quarantine are analyzed to determine whether they represent a threat or not.
If they do not represent a threat, you can restore them, using the Restore option in the Quarantine window and indicating the path to which quarantined files are to be restored.
This option is not available for Linux computers.
Use this section if you want to set an uninstallation password.
You'll be prompted to enter it if you want to uninstall the protection from the computers belonging to the profile that you are creating.