Quarantine

 

Adaptive Defense 360 quarantines all items that appear to be suspicious or non-disinfectable, as well as the spyware and hacking tools detected.

Once a suspicious item has been quarantined for analysis, there are three possible scenarios:

Quarantine on Linux computers

On Linux computers, neither suspicious items nor detected malware are quarantined.

Detected malware is either disinfected or removed, and suspicious items are reported to the administrator, but no action is taken on them.

Quarantine on OS X computers

OS X computers only have a local quarantine. After a file has been sent to quarantine, you can choose to perform any of the available actions on it (mark as suspicious, repair or delete).

Quarantine on Windows computers

In the Web console main window, click Quarantine. A new window will open, divided into two sections: a search area and a section displaying a result list.

Searching for quarantined items

The search area lets you filter the items you want to view by their characteristics. There are four filter parameters:

By default, the window displays the items that were sent to quarantine for being suspicious.

    1. Select the period you want.

    2. Click Find.

To restore an item, select the relevant checkbox, click Restore and respond affirmatively to the confirmation message. The item will disappear from the search list, but you will be able to find it in the Files excluded from the scan window.

If you want to delete any of the items found, select the corresponding checkbox, click Delete and respond affirmatively to the confirmation message.  

 

List of quarantined items

If there are several items that contain the same type of malware, restoring or deleting one of them will also restore or delete the others.

Place the mouse pointer on any of the items in the search list to display a yellow tag with specific information about it.

The Computer column displays the computer's name or IP address.

The Group column indicates the group to which the computer belongs. The full path of the group is only displayed in the tooltip and in the files obtained after exporting the data shown in the console to Excel or CSV.

Thanks to its Anti-Exploit technology, Adaptive Defense 360 makes a copy of every item sent to quarantine. This way, if there is an error or the solution quarantines an item that should not be quarantined, Adaptive Defense 360 will be able to restore it to its original location.