
When Norton Power Eraser has completed the process, the app reports on the disposition of the found items. For testing, I always removed suspicious items.Īt this point the product requires another reboot to finish cleaning up. If you do choose to remove suspicious items the program warns that these may not actually represent malware. Bad traces are marked for removal by default those that are merely suspicious are not. When the scan finishes it presents the bad and suspicious malware traces that were found. The only other settings let you clear the log or change where it's stored. Its minimalist configuration page includes the option to specify proxy settings if needed for the Internet connection. Norton Power Eraser needs access to the online Norton Insight database, so it won't work if it can't connect with the Internet. You can choose to scan for rootkits, in which case an initial reboot will be required. Once you've agreed to the license you choose to launch a scan or to review (and possibly reverse) previous scans.

On launch, Norton Power Eraser gets right to the point. Just in case, however, it features the ability to fully roll back any changes it has made. It's unlikely that this would cause system problems, though, because Norton Power Eraser won't touch known good programs identified as such in the vast Norton Insight database. Best Hosted Endpoint Protection and Security Softwareīecause the scan performed by Norton Power Eraser is more aggressive than that of other Norton products, it could conceivably damage non-malicious files.
