The genuine WDC.exe file is a software component of Websense Web Filter & Security by Forcepoint.
Websense Web Filter & Security is a security program that filters out incoming and outgoing data to minimize security risks. This file is not a critical Windows file and can be removed if known to create problems. WDC.exe launches the Websense Desktop Client. This is not an essential Windows process and can be disabled if known to create problems. Websense Web Filter & Security is a security application designed for the Windows platform. The program features full port monitoring with multiple authentication options for users and groups, controls to address viral, entertainment and surveillance media with support for YouTube educational videos. The program offers more than 120 Web security and content categories. Forcepoint (formerly Websense and Raytheon|Websense) is an American company that offers security solutions to businesses and government institutions. The company was founded in 1994 by Phil Trubey. It was acquired by Vista Equity Partners in 2013 for $906 million. Forcepoint is currently headquartered in Austin, Texas.
WDC stands for Websense Desktop Client Application
The .exe extension on a filename indicates an executable file. Executable files may, in some cases, harm your computer. Therefore, please read below to decide for yourself whether the WDC.exe on your computer is a Trojan that you should remove, or whether it is a file belonging to the Windows operating system or to a trusted application.
The process known as WDC Application or Websense Client Agent belongs to software ATK Package or ATK Hotkey or WDC Application or Remote Filtering Client or Websense Client Agent by ASUS (www.asus.com) or Websense (www.websense.com).
Description: WDC.exe is not essential for Windows and will often cause problems. The file WDC.exe is located in a subfolder of "C:\Program Files".
Known file sizes on Windows 10/8/7/XP are 174,648 bytes (60% of all occurrences), 151,552 bytes and 7 more variants.
The program has no visible window. The file is not a Windows system file. There is no file information. The file has a digital signature. It is a Verisign signed file. Therefore the technical security rating is 29% dangerous, however you should also read the user reviews.
Recommended: Identify WDC.exe related errors
Important: Some malware camouflages itself as WDC.exe, particularly when located in the C:\Windows or C:\Windows\System32 folder. Therefore, you should check the WDC.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.
A clean and tidy computer is the key requirement for avoiding problems with WDC. This means running a scan for malware, cleaning your hard drive using 1cleanmgr and 2sfc /scannow, 3uninstalling programs that you no longer need, checking for Autostart programs (using 4msconfig) and enabling Windows' 5Automatic Update. Always remember to perform periodic backups, or at least to set restore points.
Should you experience an actual problem, try to recall the last thing you did, or the last thing you installed before the problem appeared for the first time. Use the 6resmon command to identify the processes that are causing your problem. Even for serious problems, rather than reinstalling Windows, you are better off repairing of your installation or, for Windows 8 and later versions, executing the 7DISM.exe /Online /Cleanup-image /Restorehealth command. This allows you to repair the operating system without losing data.
To help you analyze the WDC.exe process on your computer, the following programs have proven to be helpful: ASecurity Task Manager displays all running Windows tasks, including embedded hidden processes, such as keyboard and browser monitoring or Autostart entries. A unique security risk rating indicates the likelihood of the process being potential spyware, malware or a Trojan. BMalwarebytes Anti-Malware detects and removes sleeping spyware, adware, Trojans, keyloggers, malware and trackers from your hard drive.