Key Features/Changes:
1. Rootkit Scanner
Norton Power Eraser can turn on additional logging after rebooting the machine to enhance the detection of stealth rootkits. Users are presented a choice after selecting scan from the main UI, to either run the rootkit scan or continue to run a scan without the enhanced rootkit detection.
2. Configurable Proxy
Within the settings UI, you can enter settings for an external proxy, including the authentication password. This will allow Norton Power Eraser to work with network configurations that use a proxy.
3. Non-repairable threat flow
In the event Norton Power Eraser detects a file that cannot automatically be repaired, the user will be provided a link to an article directing the next steps for removal. This article will aid customers by providing any manual steps necessary to remove the threat.