Step-by-Step Guide to Using Anti-Malware - Product Guides
Gridinsoft Logo
Guide

Step-by-Step Guide to Using Anti-Malware

Basic Setup & First Scan

Clean Your PC in 4 Minutes: A Beginner’s Guide

  • Download & Install

    Visit the official Gridinsoft website and navigate to the Downloads section. Select the version compatible with your Windows OS (11, 10, 8, or 7). Click the Download Now button, then run the installer. Follow the on-screen prompts—agree to the terms, choose your installation directory, and finalize the setup. Ensure your PC meets the minimal requirements (1 GB RAM, 300 MB disk space) for optimal performance.

  • Launch & Configure

    Open Gridinsoft Anti-Malware from your desktop shortcut or Start menu. Upon first launch, review the default settings: real-time protection is enabled, and scan schedules are preset to weekly. Adjust these under Settings > Preferences if needed (e.g., exclude non-critical folders). Confirm your preferences to activate baseline protection tailored to your usage habits.

  • Run Quick Scan

    Click the Scan Now button on the Scan Page. The tool will perform a comprehensive sweep of your system memory, registry, browsers, and files. A progress bar displays real-time detection stats, highlighting threats like keyloggers or adware. The scan typically completes in 3–4 minutes, depending on your drive size and system speed.

  • Review & Remove

    Post-scan, a detailed report categorizes threats by risk level (Critical, High, Low). Select Remove All to automatically quarantine and delete malicious items. For transparency, review flagged items under Scan Logs—each entry includes the threat name, location, and action taken. Restart your PC to finalize cleanup.

Installation to results: Download, scan execution, and detected threats.
Installation to results: Download, scan execution, and detected threats.
Emergency Threats

Stop an Active Infection in 3 Steps

Scan completion: 'System Clean' confirmation with resolved threats
Scan completion: “System Clean” confirmation with resolved threats.
  • Boot in Safe Mode
    Follow this quick guide:

    Reboot your PC and press F8 (or Shift + Restart on Windows 10/11) to access Advanced Boot Options. Select Safe Mode with Networking to disable non-essential processes. This prevents malware from launching automatically, isolating the infection for easier removal.

  • Run Quick Scan
    Focus on critical areas (browsers, memory, startup)

    In Safe Mode, open Gridinsoft Anti-Malware and select Quick Scan from the dashboard. This targets high-risk areas: running processes, startup entries, and browser extensions. The scan identifies active threats like ransomware or data stealers within 60 seconds, prioritizing immediate risks over full-system checks.

  • Quarantine Threats
    Isolate high-risk items before deletion.

    Review detected threats and select Quarantine to isolate them from your system. Quarantined items are moved to a secure, encrypted folder, preventing further execution. After removal, reboot normally to exit Safe Mode and restore full functionality.

Proactive Protection Routine

Set It and Forget It: Automated Defense

  • Schedule Scans
    Daily/weekly automated checks.

    Navigate to Settings > Scheduled Scan. Toggle Scheduled Scans and choose frequency (daily/weekly) and time (e.g., during lunch breaks). Scans run silently, and results are logged for later review.

  • Enable Real-Time Shields
    Toggle on browser/network monitoring.

    Under Protection, activate Internet Security to flag suspicious connections. Activate On-Run protection to block malicious scripts. Customize Ignore List via Tools to avoid interruptions during work.

  • Update Settings
    Enable auto-downloads for threat databases.

    Ensure Auto-Update is enabled in Settings > Update. The tool checks for threat database updates hourly, ensuring defenses stay ahead of rising threats. Manual updates can be triggered under Update > Check for Updates.

Active shields: Real-time, browser, and network monitoring enabled.
Active shields: Real-time, browser, and network monitoring enabled.
Advanced User Customization

Tailor Your Defense: Expert Mode

Settings panel: Configure scan depth, heuristics, and automation
Settings panel: Configure scan depth, heuristics, and automation.
  • Custom Scans
    Target specific folders/processes.

    Navigate to Scan->Custom Scan, select specific folders (e.g., Downloads, Temp), file types (EXE, DLL), or processes to scrutinize.

  • Adjust Heuristics
    Set sensitivity levels to reduce false positives.

    In Settings->General, modify heuristic sensitivity from Low to Aggressive. Higher levels detect unknown threats but may increase false positives. Use Ignore List to exclude trusted files flagged incorrectly.

  • Export Reports
    Save logs for IT teams or audits.

    Post-scan, click Tools->Scan Logs to access all the completed scans. Click Save As... to share these with IT teams for audits or compliance checks. Reports include timestamps, threat hashes, and remediation actions.

Post-Infection Recovery

Restore Your PC After a Malware Attack

  • Run Full Scan
    Remove residual files/registry entries

    After removing malware, select Scan->Full Scan. This will search for residual files (temp data, cookies) and repairs registry entries corrupted by the infection. It Helps to reclaim disk space and stabilize performance.

  • Reset Browsers
    Use built-in tools to undo hijacked settings.

    Use tools to change passwords for compromised accounts (email, banking). Enable two-factor authentication (2FA) where possible.

  • Audit Accounts
    Check for compromised passwords.

    Use tools to change passwords for compromised accounts (email, banking). Enable two-factor authentication (2FA) where possible.

Browser reset: Restores default settings, removes hijacks
Browser reset: Restores default settings, removes hijacks.