Establish a protection grid for the operating system. Check incoming data transfers and requests for personal information. Identify and remove viruses, spyware, trojans, worms, bots, and rootkits. Adjust the running parameters of the software according to personal preferences.