The following table describes how the different components of Worry-Free Business Security protect your computers from threats.
| Threat | Protection | 
|---|---|
| Virus/Malware. Virus, Trojans, Worms, Backdoors, and Rootkits Spyware/Grayware. Spyware, Dialers, Hacking tools, Password cracking applications, Adware, Joke programs, and Keyloggers | File-based scans (Real-time Scan, Manual Scan, Scheduled Scan) | 
| Security threats transmitted through email messages | POP3 Mail Scan in the Security Agent | 
| Network worms/viruses and intrusions | Firewall in the Security Agent | 
| Conceivably harmful websites/Phishing sites | Web Reputation and URL Filtering in the Security Agent | 
| Security threats that spread through USB and other external devices | Device Control in the Security Agent | 
| Malicious behavior | Behavior Monitoring in the Security Agent | 
| Ransomware programs that target documents that run on endpoints | Behavior Monitoring and Predictive Machine Learning in the Security Agent | 
 
		