Adaptive Defense 360 quarantines all items that appear to be suspicious or non-disinfectable, as well as the spyware and hacking tools detected.
Once a suspicious item has been quarantined for analysis, there are three possible scenarios:
The item is classified as malicious and there is a disinfection routine for it: It is disinfected and restored to its original location.
The item is classified as malicious but there is no disinfection routine for it: It is deleted.
The item is found to be harmless: It is restored to its original location.
On Linux computers, neither suspicious items nor detected malware are quarantined.
Detected malware is either disinfected or removed, and suspicious items are reported to the administrator, but no action is taken on them.
OS X computers only have a local quarantine. After a file has been sent to quarantine, you can choose to perform any of the available actions on it (mark as suspicious, repair or delete).
In the Web console main window, click Quarantine. A new window will open, divided into two sections: a search area and a section displaying a result list.
The search area lets you filter the items you want to view by their characteristics. There are four filter parameters:
Reason. Select the type of files to find in the Reason menu. Files are classified according to the reason they were placed in quarantine.
By default, the window displays the items that were sent to quarantine for being suspicious.
Group. Once you have selected the type of file to find, select the group or subgroup of computers you want to search in.
Date:
Select the period you want.
Click Find.
To restore an item, select the relevant checkbox, click Restore and respond affirmatively to the confirmation message. The item will disappear from the search list, but you will be able to find it in the Files excluded from the scan window.
If you want to delete any of the items found, select the corresponding checkbox, click Delete and respond affirmatively to the confirmation message.
If there are several items that contain the same type of malware, restoring or deleting one of them will also restore or delete the others.
Place the mouse pointer on any of the items in the search list to display a yellow tag with specific information about it.
The Computer column displays the computer's name or IP address.
The Group column indicates the group to which the computer belongs. The full path of the group is only displayed in the tooltip and in the files obtained after exporting the data shown in the console to Excel or CSV.
Thanks to its Anti-Exploit technology, Adaptive Defense 360 makes a copy of every item sent to quarantine. This way, if there is an error or the solution quarantines an item that should not be quarantined, Adaptive Defense 360 will be able to restore it to its original location.