Frequently Asked Questions

Familiar malware is recognised almost immediately during scanning. When a threat is completely new and absent from existing signature lists, current antivirus products use behavioural monitoring and heuristic techniques to flag suspicious activity — typically within moments of the file attempting to execute.

In most cases, the flagged file is moved to an isolated quarantine folder where it can no longer run or interact with the rest of your system. From there, you can inspect the file and decide whether to permanently remove it or restore it if you believe it was incorrectly flagged.

It is not recommended. While certain installers may trigger a false alarm, switching off protection leaves your system vulnerable at the very moment new files are being added. Instead, create a targeted exception for the specific installer so the rest of your real-time protection remains intact.

It depends on the provider and tier. Basic paid plans often cover a single device, whereas household or family packages generally protect anywhere from three to ten devices running Windows, macOS, Android, or iOS. Always review the licence details to confirm the device limit matches your needs.