User guide
8
Table of Contents
INSTALLING QUICK HEAL TOTAL SECURITY ......................................................................................................................................... 10
GETTING STARTED ........................................................................................................................................................................................ 10
SYSTEM REQUIREMENTS............................................................................................................................................................................. 11
HOW TO INSTALL QUICK HEAL TOTAL SECURITY ................................................................................................................................ 16
UNINSTALLING QUICK HEAL TOTAL SECURITY.................................................................................................................................... 17
REGISTERING QUICK HEAL TOTAL SECURITY ...................................................................................................................................... 18
REGISTERING ONLINE WITH INTERNET CONNECTION ON THE SAME PC ....................................................................................... 18
REGISTERING OFFLINE WITH INTERNET CONNECTION ON SOME OTHER PC ................................................................................ 19
IMPORTANT INFORMATION ABOUT MULTI-USER PACK REGISTRATION ........................................................................................ 20
REACTIVATION .............................................................................................................................................................................................. 20
RENEWAL ........................................................................................................................................................................................................ 21
RENEWING ONLINE USING INTERNET ACCESS ON THE SAME PC ..................................................................................................... 21
RENEWING OFFLINE USING INTERNET ACCESS ON SOME OTHER PC .............................................................................................. 22
CAN I INSTALL QUICK HEAL ON ANOTHER COMPUTER? .................................................................................................................... 23
WHAT TO DO IF MY PRODUCT KEY IS LOST? .......................................................................................................................................... 23
USING QUICK HEAL TOTAL SECURITY ..................................................................................................................................................... 24
ABOUT QUICK HEAL MAIN WINDOW ....................................................................................................................................................... 24
RIGHT SHELL MENU OPTIONS .................................................................................................................................................................... 26
USING HELP..................................................................................................................................................................................................... 26
PERFORMING MANUAL SCANS .................................................................................................................................................................. 27
SCHEDULING QUICK HEAL TOTAL SECURITY SCANNER .................................................................................................................... 31
USING ONLINE PROTECTION ...................................................................................................................................................................... 32
USING EMAIL PROTECTION......................................................................................................................................................................... 34
KNOWING ABOUT TRUSTED EMAIL CLIENTS ........................................................................................................................................ 35
USING DATA PROTECTION .......................................................................................................................................................................... 35
USING STARTUP SCAN ................................................................................................................................................................................. 36
USING MESSENGER ....................................................................................................................................................................................... 37
VIEWING REPORTS ........................................................................................................................................................................................ 38
STATISTICS...................................................................................................................................................................................................... 39
VIEWING VIRUS LIST .................................................................................................................................................................................... 41
QUARANTINE .................................................................................................................................................................................................. 41
AUTORUN PROTECTION ............................................................................................................................................................................... 42
SYSTEM INFORMATION ............................................................................................................................................................................... 45
CREATING EMERGENCY CD OR COMMAND LINE SCANNER .............................................................................................................. 46
OVERVIEW OF NATIVE BOOT SCAN .......................................................................................................................................................... 47
USING QUICK HEAL ANTIMALWARE ........................................................................................................................................................ 47
WHEN QUICK HEAL ANTIMALWARE SHOULD BE USED? .................................................................................................................... 49
USING QUICK HEAL ANTI-PHISHING......................................................................................................................................................... 50
USING EXTRA TOOLS .................................................................................................................................................................................... 51
HIJACK RESTORE ........................................................................................................................................................................................... 52
WINDOWS SPY ................................................................................................................................................................................................ 53
TRACK CLEANER ........................................................................................................................................................................................... 53
ADVANCED SYSTEM EXPLORER ................................................................................................................................................................ 53
ABOUT SECTION ............................................................................................................................................................................................ 54
USING PC2MOBILE SCAN ................................................................................................................................................................................ 55
IMPORTANT REQUIREMENTS FOR PC2MOBILE SCAN .......................................................................................................................... 57