Changing the Landscape in Data Protection

Subscriptions
Monthly
Perfect for businesses that need flexibility without long-term commitments. Get full access to all features, real-time protection, and ongoing updates all on a month-to-month basis.
Real-Time Detection & Alerts
Background Operation
Questions & Answers
Navigate to C:\ProgramFiles\NAWatch. Double-click NAWatchClient.exe. This application window must remain open, but can be minimized to the toolbar.
There are two ways:
1. Navigate to C:\ProgramData\NAWatch\Logs. This will show Searchlights' activity and results.
2. In the Windows search bar, type "Task Scheduler". Click on "Task Scheduler Library". NAWatch [Which is SearchLight] will appear in the library list with a status of "Ready".
Windows operating systems
We prioritize your privacy. SearchLight operates locally on your device and does not collect data.
Groups and individuals that handle sensitive customer data or proprietary information.
A dialog box will appear giving the name of the service that has flagged with suspicious activity and an option to stop or allow it to continue. If you have not completed any file transfers in the last hour, this could be attacker activity. You should get the matter investigated further.
Occasionally SearchLight is flagged by the A.I. antivirus tool this program is using. To avoid this, you can omit SearchLight from Malwarebytes scans in their settings -> scans/detections tab -> configure Allow List.
Yes, If installing on your personal computer ,however, your profile likely has the admin privileges without needing to switch to the actual Admin account.