sends to quarantine suspicious or non-disinfectable items, as well as spyware and hacking tools detected.
Once suspicious items have been quarantined for analysis, there are three possible scenarios:
Items are determined as
malicious: They are disinfected and then restored to their original
location, provided that a disinfection routine exists for them.
Items are determined as
malicious, but there is no disinfection routine: They are eliminated.
It is established that the
items in question are not malicious. They are directly restored
to their original location.
On Linux computers, neither suspicious items nor detected malware are sent to quarantine.
Detected malware is either disinfected or removed, and suspicious items are reported, but no action is taken on them.
These computers only have local quarantine. After files have been sent to quarantine, you can choose to perform any of the available actions on them (mark as suspicious, repair or delete).
In the Web console main window, click Quarantine. The window is divided into two sections: a search area and a section displaying the list of results.
In the search area you can filter the items you want to view. There are four filter parameters:
In the Reason menu, select the type of files to find. Files are classified according to the reason they were put in quarantine.
By default, the window displays the items that have been sent to quarantine for being suspicious.
Once you have selected the type of file you want to find, select the group of computers you want to search.
Select the period you want.
Click Find.
If you want to restore any item, select the relevant checkbox, click Restore and respond affirmatively to the confirmation message. The item will disappear from the search list and you will be able to find it in the Files excluded from the scan window.
If you want to delete any of the items found, select the relevant checkbox, click Delete and respond affirmatively to the confirmation message.
If there are several items that contain the same type of malware, when restoring or deleting one of them, the others will also be restored or deleted.
When you place the mouse pointer on any of the items in the search list, a yellow tag will appear with information about the item.
The Computer column displays the name of the computer or its IP address, depending on what you selected in the Default view section, in Preferences.
The Group column indicates the group to which the computer belongs. The full path of the group is only displayed in the tooltip, and in the Excel and CSV files obtained after exporting the data displayed in the console.
Thanks to its Anti-Exploit technology, makes a copy of all items it sends to quarantine. If there is an error or the solution quarantines an item that should not be quarantined, can restore it to its original location.