Gridinsoft Logo

Product Guides

Explore our library of step-by-step guides, tutorials, and best practices for Gridinsoft Anti-Malware and other cybersecurity tools. Learn how to install, configure, and maximize protection on your devices with clear, actionable instructions. Whether you’re a new user or an experienced IT professional, our product guides help you stay secure and get the most out of your Gridinsoft software

Our Technology Stack
Guide

Step-by-Step Guide to Using Anti-Spyware

Basic Setup & First Scan
Clean Your PC in 4 Minutes: A Beginner’s Guide
  • Download & Install
    gridinsoft.com/download

    Visit the official Gridinsoft website and navigate to the Downloads section. Select the version compatible with your Windows OS (11, 10, 8, or 7). Click the Download Now button, then run the installer. Follow the on-screen prompts—agree to the terms, choose your installation directory, and finalize the setup. Ensure your PC meets the minimal requirements (1 GB RAM, 300 MB disk space) for optimal performance.

  • Launch & Configure
    Open the tool, accept default settings for optimal protection

    Open Gridinsoft Anti-Spyware from your desktop shortcut or Start menu. Upon first launch, review the default settings: real-time protection is enabled, and scan schedules are preset to weekly. Adjust these under Settings > Preferences if needed (e.g., exclude non-critical folders). Confirm your preferences to activate baseline protection tailored to your usage habits.

  • Run Quick Scan
    Click Quick Scan—watch real-time threat detection.

    Click the Scan Now button on the Scan Page. The tool will perform a comprehensive sweep of your system memory, registry, browsers, and files. A progress bar displays real-time detection stats, highlighting threats like keyloggers or adware. The scan typically completes in 3–4 minutes, depending on your drive size and system speed.

  • Review & Remove
    Approve automatic cleanup of detected risks.

    Post-scan, a detailed report categorizes threats by risk level (Critical, High, Low). Select Remove All to automatically quarantine and delete malicious items. For transparency, review flagged items under Scan Logs—each entry includes the threat name, location, and action taken. Restart your PC to finalize cleanup.

Installation to results: Download, scan execution, and detected threats.
Installation to results: Download, scan execution, and detected threats.
Emergency Spyware Removal
Stop an Active Infection in 3 Steps
Scan completion: 'System Clean' confirmation with resolved threats
Scan completion: “System Clean” confirmation with resolved threats.
  • Boot in Safe Mode
    Follow this quick guide:

    Reboot your PC and press F8 (or Shift + Restart on Windows 10/11) to access Advanced Boot Options. Select Safe Mode with Networking to disable non-essential processes. This prevents spyware from launching automatically, isolating the infection for easier removal.

  • Run Quick Scan
    Focus on critical areas (browsers, memory, startup)

    In Safe Mode, open Gridinsoft Anti-Malware and select Quick Scan from the dashboard. This targets high-risk areas: running processes, startup entries, and browser extensions. The scan identifies active threats like ransomware or data stealers within 60 seconds, prioritizing immediate risks over full-system checks.

  • Quarantine Threats
    Isolate high-risk items before deletion.

    Review detected threats and select Quarantine to isolate them from your system. Quarantined items are moved to a secure, encrypted folder, preventing further execution. After removal, reboot normally to exit Safe Mode and restore full functionality.

Proactive Protection Routine
Set It and Forget It: Automated Defense
  • Schedule Scans
    Daily/weekly automated checks.

    Navigate to Settings > Scheduled Scan. Toggle Scheduled Scans and choose frequency (daily/weekly) and time (e.g., during lunch breaks). Scans run silently, and results are logged for later review.

  • Enable Real-Time Shields
    Toggle on browser/network monitoring.

    Under Protection, activate Internet Security to flag suspicious connections. Activate On-Run protection to block malicious scripts. Customize Ignore List via Tools to avoid interruptions during work.

  • Update Settings
    Enable auto-downloads for threat databases.

    Ensure Auto-Update is enabled in Settings > Update. The tool checks for threat database updates hourly, ensuring defenses stay ahead of rising threats. Manual updates can be triggered under Update > Check for Updates.

Active shields: Real-time, browser, and network monitoring enabled.
Active shields: Real-time, browser, and network monitoring enabled.
Advanced User Customization
Tailor Your Defense: Expert Mode
Settings panel: Configure scan depth, heuristics, and automation
Settings panel: Configure scan depth, heuristics, and automation.
  • Custom Scans
    Target specific folders/processes.

    Navigate to Scan->Custom Scan, select specific folders (e.g., Downloads, Temp), file types (EXE, DLL), or processes to scrutinize.

  • Adjust Heuristics
    Set sensitivity levels to reduce false positives.

    In Settings->General, modify heuristic sensitivity from Low to Aggressive. Higher levels detect unknown threats but may increase false positives. Use Ignore List to exclude trusted files flagged incorrectly.

  • Export Reports
    Save logs for IT teams or audits.

    Post-scan, click Tools->Scan Logs to access all the completed scans. Click Save As... to share these with IT teams for audits or compliance checks. Reports include timestamps, threat hashes, and remediation actions.

Post-Infection Recovery
Restore Your PC After a Spyware Attack
  • Run Full Scan
    Remove residual files/registry entries

    After removing spyware, select Scan->Full Scan. This will search for residual files (temp data, cookies) and repairs registry entries corrupted by the infection. It Helps to reclaim disk space and stabilize performance.

  • Reset Browsers
    Use built-in tools to undo hijacked settings.

    Use tools to change passwords for compromised accounts (email, banking). Enable two-factor authentication (2FA) where possible.

  • Audit Accounts
    Check for compromised passwords.

    Use tools to change passwords for compromised accounts (email, banking). Enable two-factor authentication (2FA) where possible.

Browser reset: Restores default settings, removes hijacks
Browser reset: Restores default settings, removes hijacks.
;