Security report
We're sorry, but an error occurred while loading your Personal Security Report.
This error could be caused by:
- A connection timeout while loading the page
- An error contacting Webroot's servers
- An unsupported browser or device
Please try accessing the report at a later time by clicking "See the Report" within your Webroot SecureAnywhere® product.
If you continue to experience this error, please contact us for assistance.
Threat activity
Protection status
Additional Protection
Security Resources
THREAT ACTIVITY
Congratulations!
No malicious file activities have been detected on your devices. Webroot has classified file activities as safe, and will continue to check all files and their actions automatically to make sure you're protected.
Your Endpoint Protection is ENABLED
Number of Active Seats: Activate unused seats
Your Endpoint Protection is DISABLED
Please log into your console to turn your endpoint protection on or read the user guide.
Webroot is not able to detect your threat activity or protection status.
Webroot scans your devices for threats without interruptions or slowdowns.
System Optimizer removes traces of your online activity and files that show your computer use.
Latest threat removed from your devices:
Your Endpoint Protection is ENABLED
Number of Active Seats: Activate unused seats
Your Endpoint Protection is DISABLED
Please log into your console to turn your endpoint protection on or read the user guide.
Number of Active Seats: Activate unused seats
Your Endpoint Protection is PARTIALLY ENABLED !
Please log into your console to turn your endpoint protection on or read the user guide.
Number of Active Seats: Activate unused seats
Webroot is not able to detect your threat activity or protection status.
The Firewall monitors data traffic traveling out of your computer. It looks for untrusted processes that try to connect to the internet and steal your personal information.
ENABLED
DISABLED
Identity Shield secures your browsing sessions against identity theft and ensures your personal information stays protected as you bank, shop, and interact online.
ENABLED
DISABLED
The Phishing Shield identifies and blocks fake websites that trick you into entering your personal information. As you browse, URLs are evaluated in real time for phishing risk
ENABLED
DISABLED
As you browse, the Web Threat Shield alerts you to websites that may pose a threat.
ENABLED
DISABLED
The Rootkit Shield blocks rootkits from being installed on your computer and removes any that are present.
ENABLED
DISABLED
Infrared adapts itself to your security needs by identifying suspicious files and malware before it harms your system.
ENABLED
DISABLED
The USB Shield monitors an installed USB flash drive for threats, and blocks and removes any threats that it finds.
ENABLED
DISABLED
The Offline Shield protects your system from threats while your computer is not connected to the internet.
ENABLED
DISABLED
DNS Protection
DNS Protection is a domain filtering service designed to provide more granular control over internet access. It extends our award-winning endpoint protection into the network to protect customers from malicious happening outside of the browser and enables category-based internet usage restrictions across the network. Configurable for thecorporate guest WiFi, roaming users, and groups.
Endpoint Protection
Today's threats use multiple vectors to attack, from malicious attachments to phishing sites. To secure businesses, you need endpoint protection that’s stronger and smarter than traditional antivirus. That’s why we designed Webroot® Business Endpoint Protection. It’s efficient, effective, easy to use, and automated to put time back in your day.
Security Awareness Training
Webroot Security Awareness Training combines a Phishing Simulator with comprehensive security training and compliance courses integrated within this console and a highly automated Learning Management System. It makes deployment and execution of high quality security awareness campaigns easy, even by non-experts, and the results are fewer infections, support calls and time spent fixing user errors