Support

Home » Support » Shield Deluxe

Shield Deluxe Support

How do I manage quarantined files?

Shield Deluxe isolates the malware-infected files it cannot disinfect and the suspicious files in a secure area named quarantine. When a virus is in quarantine it cannot do any harm because it cannot be executed or read.

By default, quarantined files are automatically sent to iS3 Labs in order to be analyzed by the iS3 malware researchers. If malware presence is confirmed, a signature is released to allow removing the malware.

In addition, Shield Deluxe scans the quarantined files after each malware signature update. Cleaned files are automatically moved back to their original location.

To check and manage quarantined files, follow these steps:

  1. Open the Shield Deluxe window.
  2. Access the Protection panel.
  3. Click the Antivirus module.
  4. In the Antivirus window, select the Quarantine tab.
  5. Quarantined files are managed automatically by Shield Deluxe according to the default quarantine settings. Though not recommended, you can adjust the quarantine settings according to your preferences.
    • Rescan quarantine after virus definitions update
      Keep this option turned on to automatically scan quarantined files after each virus definitions update. Cleaned files are automatically moved back to their original location.
    • Submit suspicious quarantined files for further analysis
      Keep this option turned on to automatically send quarantined files to iS3 Labs. The sample files will be analyzed by the iS3 malware researchers. If malware presence is confirmed, a signature is released to allow removing the malware.
    • Delete content older than {30} days
      By default, quarantined files older than 30 days are automatically deleted. If you want to change this interval, type a new value in the corresponding field. To disable automatic deletion of old quarantined files, type 0.
  6. To delete a quarantined file, select it and click the Delete button. If you want to restore a quarantined file to its original location, select it and click Restore.
What is Active Virus Control?

iS3 Active Virus Control is an innovative proactive detection technology which uses advanced heuristic methods to detect new potential threats in real time.

Active Virus Control continuously monitors the applications running on the computer, looking for malware-like actions. Each of these actions is scored and an overall score is computed for each process. When the overall score for a process reaches a given threshold, the process is considered to be harmful and it is blocked automatically.

If Autopilot is off, you will be notified through a pop-up window about the blocked application. Otherwise, the application will be blocked without any notification. You can check what applications have been detected by Active Virus Control in the Events window.

To turn on / off Active Virus Control, follow these steps:
  1. Open the Shield Deluxe window.
  2. Access the Protection panel.
  3. Click the Antivirus module.
  4. In the Antivirus window, select the Shield tab.
  5. Click the switch to turn on or off Active Virus Control.
How do I configure data protection?

If you want to use data protection, follow these steps:

  1. Open the Shield Deluxe window.
  2. Access the Privacy panel.
  3. Click the Data Protection module.
  4. Make sure data protection is enabled.
  5. Create rules (see below) to protect your sensitive data.
Creating data protection rules

To create a rule, click the Add rule button and follow the configuration wizard. You can navigate through the wizard using the Next and Back buttons. To exit the wizard, click Cancel.

  1. Describe Rule
    You must set the following parameters:
    • Rule Name - type the name of the rule in this edit field.
    • Rule Type - choose the rule type (address, name, credit card, PIN, SSN, etc).
    • Rule Data - type the data you want to protect in this edit field. For example, if you want to protect your credit card number, type all or part of it here.
      Important: It is recommended to enter at least three characters in order to avoid mistakenly blocking messages and web pages. However, for extra safety, only enter partial data (for example, only a part of your credit card number).
    • Rule Description - enter a short description of the rule in the edit field. Since the blocked data (character string) is not displayed in plain text when accessing the rule, the description should help you easily identify it.
  2. Configure rule settings
    1. Select the type of traffic you want Shield Deluxe to scan.
      • Scan Web (HTTP traffic) - scans the HTTP (web) traffic and blocks the outgoing data that matches the rule data.
      • Scan e-mail (SMTP traffic) - scans the SMTP (mail) traffic and blocks the outgoing e-mail messages that contain the rule data.
      You can choose to apply the rule only if the rule data matches whole words or if the rule data and the detected string case match.
    2. Specify the users for which the rule applies.
      • Only for me (current user) - the rule will apply only to your user account.
      • All users - the rule will apply to all Windows accounts.
      • Limited user accounts - the rule will apply to you and all limited Windows accounts.
      Click Finish. The rule will appear in the table.

From now on, any attempt to send the rule data through the selected protocols will fail. An entry will be displayed in the Events window indicating that Shield Deluxe has blocked identity specific content from being sent.

How do I clean a virus in an archive?

An archive is a file or a collection of files compressed under a special format to reduce the space on disk necessary for storing the files.

Some of these formats are open formats, thus providing Shield Deluxe the option to scan inside them and then take appropriate actions to remove them.

Other archive formats are partially or fully closed, and Shield Deluxe can only detect the presence of viruses inside them, but is not able to take any other actions.

If Shield Deluxe notifies you that a virus has been detected inside an archive and no action is available, it means that removing the virus is not possible due to restrictions on the archive's permission settings.

Here is how you can clean a virus stored in an archive:

  1. Identify the archive that includes the virus by performing a System Scan of the system.
  2. Turn off the Shield Deluxe real-time antivirus protection:
    1. Open the Shield Deluxe window.
    2. Access the Protection panel.
    3. Click the Antivirus module.
    4. In the Antivirus window, select the Shield tab.
    5. Click the switch to turn off On-access scanning.
  3. Go to the location of the archive and decompress it using an archiving application, like WinZip.
  4. Identify the infected file and delete it.
  5. Delete the original archive in order to make sure the infection is totally removed.
  6. Recompress the files in a new archive using an archiving application, like WinZip.
  7. Turn on the Shield Deluxe real-time antivirus protection and run a Full system scan in order to make sure there is no other infection on the system.
How do I clean my Windows registry?

Many applications write keys in the Windows Registry at installation time. When removing such applications, some of their associated registry keys might not be deleted and continue to remain in the Windows Registry, slowing down your system and even causing system instability. The same happens when you delete shortcuts to or certain files of applications installed on your system, as well as in the case of corrupt drivers.

To start the Registry Cleaner wizard, follow these steps:

  1. Open the Shield Deluxe window.
  2. Access the Tools panel.
  3. Under the TuneUp panel, select Registry Cleaner.
  4. Follow the four-step guided procedure to clean the registry. You can navigate through the wizard using the Next button. To exit the wizard, click Cancel.
    1. Welcome
    2. Perform Scan
      Wait for Shield Deluxe to finish scanning the registry.
    3. Select Keys
      You can see all the invalid or orphan registry keys detected. Detailed information is provided about each registry key (name, value, priority, category).
      The registry keys are grouped based on their location in the Windows Registry:
      • Software Locations. Registry keys that contain information about the path to applications installed on your computer.
        The invalid keys are assigned a low priority, which means that you can delete them without almost any risk.
      • Custom Controls. Registry keys that contain information about the file extensions registered on your computer. These registry keys are commonly used to maintain file associations (to ensure that the correct program opens when you open a file using Windows Explorer). For example, such a registry key allows Windows to open a .doc file in Microsoft Word.
        The invalid keys are assigned a low priority, which means that you can delete them without almost any risk.
      • Shared DLLs. Registry keys that contain information on the location of shared DLLs (Dynamic Link Libraries). DLLs store functions that are used by installed applications to perform certain tasks. They can be shared by multiple applications to reduce memory and disk space requirements.
        These registry keys become invalid when the DLL they point to is moved to another location or completely removed (this usually happens when you uninstall a program).
        The invalid keys are assigned a medium priority, which means that deleting them may negatively affect the system.
      By default, all the keys are marked for deletion. You can choose to delete individual invalid keys from a selected category.
    4. Results
How do I uninstall Shield Deluxe

If you want to remove your Shield Deluxe, follow these steps:

Windows XP
  1. Click Start, go to Control Panel and double-click Add / Remove programs.
  2. Find Shield Deluxe and select Remove.
  3. Click Remove to continue.
  4. Wait for the uninstall process to complete and then reboot your system.
Windows Vista or Windows 7
  1. Click Start, go to Control Panel and double-click Programs and Features.
  2. Find Shield Deluxe and select Uninstall.
  3. Click Remove to continue.
  4. Wait for the uninstall process to complete and then reboot your system.
Windows 8
  1. From the Windows Start screen, locate Control Panel (for example, you can start typing "Control Panel" directly in the Start screen) and then click its icon.
  2. Click Uninstall a program or Programs and Features.
  3. Find Shield Deluxe and select Uninstall.
  4. Click Remove to continue.
  5. Wait for the uninstall process to complete and then reboot your system.

Older Versions of Shield Deluxe

Shield Deluxe 2012

How do I uninstall (remove) Shield Deluxe?

There are two methods of uninstalling Shield Deluxe from your computer:

Option 1: Uninstall Shield Deluxe using the system tools

Shield Deluxe can be uninstalled similar to any other software program as follows:

  1. Go to Control Panel and double click for
    • Windows XP: Add/Remove programs;
    • Windows Vista: Programs/Feature
    • Windows 7: Programs/Feature
  2. Wait for the installed software list to be displayed;
  3. Locate Shield Deluxe in this list, highlight it and then click Remove;
  4. Wait for the uninstall process to complete and then restart your computer.
Option 2: Uninstall Shield Deluxe using the uninstall tool

Alternatively you can use the Shield Deluxe uninstall tool as described below:

  1. Download the Shield Deluxe Uninstall Tool on your computer into a location of your choice. This tool can be used for both 32 bit and 64 bit operating systems.
  2. After the download completes go to the location where you downloaded and run (double-click) it;
  3. After a couple of moments the uninstall tool interface will appear;
  4. Click Uninstall;
  5. Wait for the tool to display the completion message and then restart your computer.

How do I use the scan activity bar?

The Scan Activity Bar is a graphic visualization of the scanning activity on your system. This small window is by default available only in Expert View.

You can use the Scan Activity Bar to quickly scan files and folders. Drag & Drop the file or folder you want to be scanned onto the Scan Activity Bar. Follow the Antivirus Scan wizard to complete the scan.

How do I configure the antiphishing feature?

  1. Open Shield Deluxe and switch the user interface to Expert View
  2. Click the Antivirus tab on the left-side menu
  3. Click the Shield tab. Here you can configure the Antivirus Protection Level
  4. Remove the check marks from the boxes to the left of Search Advisor and the Antiphishing options
Shield Deluxe 2010

How do I resolve "Use another key" error?

The application is requesting another key because the originally used key is still active. Once the product is installed and activated, the key that is used to activate the software is stored in the machine until it expires. Therefore, when the product is uninstalled then re-installed the software will automatically pick up the active status.

To fix this issue while in the Shield Deluxe interface you must left click on Register:

  1. Leave the "License Key" field blank (empty)
  2. Left click on Finish. Registration Wizard

To verify your product is active, double click on the product icon to enter the interface. Once in the interface information about the status of the software can be found in the mid-right side of the page.

How do I determine if my product is installed?

To manage the entire product more quickly, you can use the Shield Deluxe 2010 icon in the system tray. If you double-click this icon, Shield Deluxe 2010 will open.

Also, by right-clicking the icon, a contextual menu will allow you to quickly manage Shield Deluxe 2010.

Shield Deluxe Menu
  • Show - opens the main interface of Shield Deluxe 2010.
  • Help - opens the help file, which explains in detail how to configure and use Shield Deluxe 2010.
  • About - opens a window where you can see information about Shield Deluxe and where to look for help in case something unexpected appears.
  • Fix All Issues - helps you remove current security vulnerabilities. If the option is unavailable, there are no issues to be fixed.
  • Turn Game Mode On / Off - activates / deactivates Game Mode.
  • Update Now - starts an immediate update. A new window will appear where you can see the update status.
  • Basic Settings - opens a window where you can change the user interface mode and enable or disable the main product settings.

The Shield Deluxe 2010 system tray icon informs you when issues affect your computer or how the product operates, by displaying a special symbol, as follows:

  • Red square Red square with an exclamation mark: Critical issues affect the security of your system. They require your immediate attention and must be fixed as soon as possible.
  • Yellow square Yellow square with an exclamation mark: Non-critical issues affect the security of your system. You should check and fix them when you have the time.
  • G icon Letter G: The product operates in Game Mode.

How do I schedule a scan?

  1. Right click on the Green Compass System Tray and select Show Mini menu
  2. Left click onto Settings Main screen
  3. User Interface Settings Screen appears
    1. Change mode to Expert Mode User Interface
    2. Left click Apply and then Ok to save all changes. Apply
  4. Antivirus
    1. Click on Antivirus
    2. Click on Virus Scan
    3. Right click on Deep System Scan and select Schedule Virus Scan
  5. Scheduler
    1. Under Schedule change to "Periodically"
    2. Select the appropriate days, Start date and Start time
    3. Click the OK Button Scan Scheduler
  6. Reboot your system and your issues are resolved
Shield Deluxe 2009

How do I scan my system for viruses?

  1. Right click the Green D in your system tray
  2. Open Shield Deluxe
  3. Click on Scan
  4. Select the object you wish to scan / or you can add an object to scan
  5. Click Ok to save settings
  6. Click on the Start Scan to scan the objects.

I'm having Vista OS Service Pack 1 issues

You may experience the following issues with Shield Deluxe 2009 after installing Vista OS SP1.

  1. The product will not start with one-click from the Desktop
  2. Applications' icons do not appear on the Task Bar
  3. Task Bar will not open automatically

To resolve the above issue, please follow the steps below:

  1. Right click the Shield Deluxe icon in the lower right of your system (system tray)
  2. Select Proactive Defense under Protection in the left part of the window
  3. Click the Configure link in the right part of the window
  4. Clear the Enable Registry Guard box
  5. Click OK
  6. Minimize the application.

I am receiving Database date license expiration error

This error is directly related to the following circumstances:

  1. Computer was restore to an earlier time, thus causing issue with initial activation.
  2. Internal Error with activation server.

To resolve your issues follow the steps below:

  1. Completely uninstall Shield Deluxe 2009 (Please note you will be required to reboot your system after the removal tool)
  2. Once you reboot please reinstall Shield Deluxe

How do I disable event notifications?

To enable\disable Events notifications, do the following:

  1. Right click the Shield Deluxe 2009 icon, this icon is located in the lower right hand side of your system.
  2. Open the main application window.
  3. Click the Settings button.
  4. Click Appearance in the open window.
  5. In the right part of the window in the Events notification section check\clear Enable notifications
  6. Click Ok
  7. Minimize the main the Shield Deluxe 2009 window.

The following settings are predefined for each event:

  • Balloon – displays notification on the screen
  • E-mail – notifies about an event by e-mail
  • Sound – plays a sound when notifying about an event
  • Log – logs all program events to Windows Event Log or to the program event log

In order to change these settings, do the following:

  1. Open the main application window.
  2. Click the Settings button.
  3. Click Appearance in the open window.
  4. In the right part of the window in the Events notification section click the Advanced button.
  5. In the open Events notification settings window check the necessary settings for each notification.
  6. Click OK in each window.
  7. Minimize the main application window.

After installing Shield Deluxe, I am unable to access the internet

Disable Port 80 scanning

  1. Right click the Green D
  2. Open Shield Deluxe
  3. Click the Proactive Defense option
  4. Click on Configure link
  5. Locate Traffic Monitoring
  6. Click on Monitored all Ports
  7. Locate Port 80 and deselect the option
  8. Apply your changes.
Shield Deluxe 2008

Shield Deluxe is blocking my gaming and third party applications

After the installation of the Shield Deluxe 2008 the following problems may arise with some games and applications:

  • The application is started and the error Application error. Application will be terminated is generated
  • The application is not started

You can see the example of such error in the figure below:

Error

The issue occurs when the following games are played:

  • F.E.A.R.
  • Tom Clancy's Ghost Recon - Advanced Warfighter
  • Dungeon Siege II Broken World
  • Lego Starwars
  • Logitech Process Monitor (working monitor of web-cameras Logitech)

To resolve the issue, do the following:

  1. Click Start
  2. Select Control Panel
  3. In the Control Panel window click Add or Remove Programs
  4. Uninstall
  5. In the Add or Remove Programs window click Show updates box
  6. Make sure the update patch of Microsoft KB917422 is listed
  7. Minimize all windows
  8. Go to Microsoft page in the link: http://support.microsoft.com/kb/924867
  9. To resolve the problem of incorrect work of Microsoft security update, download and run the appropriate file
Support Image

After installation, I am unable to view my financial information.

Please follow the instructions below to configure the Shield Deluxe to work with your financial website.

Note: If you have Norton remants on your system you may experience errors and or issues retrieving banking information.

Please access the following link for a tool to remove the remnants of this application: http://service1.symantec.com/SUPPORT/sharedtech.nsf/docid/2005110110355713?OpenDocument&lg=en&ct=us&seg=hho&src=hot

Once the application and/or it's remnants have been removed proceed with the following instructions.

  1. In the main window, Click Settings
  2. In the Settings window, click the Trusted Zone button
  3. In the Trusted Zone window, click the Trusted Applications tab.
  4. If the website is in the list of programs:
    1. Click the name of the website entry to highlight it, and click Edit.
    2. In the Trusted application window, check Do not scan for all options, and click OK
  5. If the website is not in the list of programs:
    1. Click Add.
    2. In the Trusted application window, click Browse.
    3. Select My Computer, then C://(local) drive, then Program Files, then the path to the financial program and/or website and click OK.
    4. In the Trusted application window, check Do not scan for all options, and click OK

After installing Shield Deluxe, it will not complete a full system scan

This is due to the Deluxe program double scanning your Email. To correct this issue complete the following steps.

  1. Open Shield Deluxe.
  2. Click on settings in the top right corner.
  3. Click on mail antivirus.
  4. At the bottom of the window uncheck the two boxes.

Scan pop3/STMP/IMAP/NNTP traffic and Enable Microsoft Office Outlook and The Bat! support