Remove Indentified Threats
If after a scan, the data has been determined as threats, they can be deleted securely from the system disks
Simply use the filters to sort out Potential Infected Files, Potential Vulnerable, Sensitive Data, Country of Origin then click Remove Files
Read the Warning and c_onfirm you understand the risks when removing your indentified threats from your system_. If you agree with the terms, click Proceed to remove the threats, completely.
Please be very careful with this step. There is no way to retrieve back your deleted data. You are not sure of what you are about to do, please shutdown your system, backup your data, perform the scan again to trigger the removal.
Your disks now will be mounted as WRITABLE, preparing for removal. Please notice the read ribbon.
When deletion is complete, the system disks will be re-mounted as READ-ONLY again.
Please note that, if files are identified with multiple issues, they will be listed in relevant tabs. After files are removed, they will not be able to be selected.