Frequently Asked Questions
It depends on the threat type. Recognised malware is caught almost immediately when scanned. For entirely new threats that haven't been catalogued yet, modern security tools use heuristic and behaviour-based analysis to flag suspicious activity — often within moments of the file executing.
In most cases, the file is moved to a secure quarantine zone where it is unable to run or interact with other data. From there, you can inspect the item and decide whether to permanently remove it or restore it if you believe the detection was a false alarm.
It is usually not recommended. While certain legitimate installers may trigger false alerts, switching off your protection leaves you vulnerable at the very moment new files are being written to your system. A safer alternative is to create an exception for the specific installer while keeping all other protections active.
This varies between providers and plans. Basic paid licences often cover one device, whereas family or multi-device packages generally protect between three and ten devices across Windows, macOS, Android, and iOS. Always review the licence details before purchasing if you plan to secure multiple devices at home.