The full scan mode takes all local disks into account, while the custom one lets you handpick the exact drives, directories and files to scan, including optical discs, network places and removable devices. The quick scan mode verifies popular malware-hiding spots on the computer, such as system settings, common apps, running processes, startup items, and Windows critical files. 360 provides you with three scanning modes (quick, full and custom), integrates with the shell at installation for quickly scanning selected files and folders, and creates a system tray icon that you can open to temporarily disable the real-time protection, open the quarantine, view log details, check for software updates, and so on. The options are structured in pretty much the same way, though. However, this component may be postponed from setup.Īs far as the interface goes, the developer has come up with a new design, compared to the one in our previous review.
360 TOTAL SECURITY MALWARE INSTALL
The installation procedure is a fast and simple task, and the only noteworthy aspect about it is that the app offers to install a web browser protection module designed to identify phishing and Trojan sites when you're attempting to access them. More importantly, 360 Total Security Essential is free to use. The Bitdefender and Avira engines are not turned on by default, but they can be easily installed if you want to triple the antivirus protection.
This program contains a real-time guard, multiple scan modes, a quarantine, reports, a self-protection module that prevents hackers from disabling the antivirus, and a sandbox for safely running unknown programs in an isolated environment so that they cannot harm the computer, in addition to browser support for Chrome and Firefox. It features a cloud scan engine and offers support for the Bitdefender and Avira engines too. Formerly known as 360 Internet Security, 360 Total Security Essential is an all-around security application designed to protect you from all kinds of online threats, such as viruses, Trojans, worms, adware, spyware and phishing.