Follow the steps below to access the advanced settings:
Click the Settings menu.
Click the profile to configure.
In the menu on the left, click Windows and Linux.
Click Advanced settings.
Here you can configure aspects related to the installation of the protection on computers, as well as the connection of these computers to the Internet and to the servers. You can also configure options related to the suspicious file quarantine.
Indicate in which directory you want to install the protection. will show a default path, which you can change if you want.
In this section you can also indicate if you want to automatically uninstall any competitor product detected on the computer, or if you want both products to coexist on the same computer.
For more information about the default behavior for the different versions of the protection (trial or commercial versions), click here.
On Linux computers, the protection is installed in a default folder that cannot be changed.
Administrators can disable scans with Collective Intelligence. It is advisable to keep this option enabled if you want to benefit from all the protection provided by Collective Intelligence.
On Linux computers it is not possible to disable the connection to Collective Intelligence. Therefore, as long as a Linux computer is connected to the Internet, the installed protection will leverage Collective Intelligence.
Establish how often you want the computer to send information to the servers about the status of the protection installed.
You can change the default frequency, but it must be a value between 12 and 24 hours.
You can also specify the computer through which connections with the server are centralized.
To do this, select the relevant checkbox and click Select. In the Select computer window, choose a computer or search for it using the Find button. Then click OK.
To check the requirements of the computer used to establish connections with the server, click here.
Files in quarantine are analyzed to determine whether they represent a threat or not.
If they do not represent a threat, you can restore them by using the Restore option in the Quarantine window and indicating the path to which they must be restored.
This option is not available for Linux or OS X computers.
Use this section if you want to set an uninstallation password.
You'll be prompted to enter it if you want to uninstall the protection from the computers belonging to the profile that you are creating.