ITarian Help

Find the desired product help

IT Endpoint Manager

IT Endpoint Manager

Endpoint Manager Administrator Guide 6.43

English

Print Help Download Help
Security Systems > View And Manage Identified Malware
  • Introduction To Endpoint Manager
    • Key Concepts
    • Best Practices
    • Quick Start
    • Sign Up For An ITarian Account
    • Login Into The Admin Console
  • The Admin Console
  • The Dashboard
  • Devices And Device Groups
    • Manage Device Groups
      • Create Device Groups
      • Edit A Device Group
      • Assign Configuration Profiles To A Device Group
      • Remove A Device Group
      • Run Procedures On Customer Groups
    • Manage Devices
      • Add New Devices
      • Manage Windows Devices
        • View And Edit Device Name
        • View Summary Information
        • View Hardware Information
        • View Network Information
        • View Maintenance Windows Associated With Device
        • View And Manage Profiles Associated With A Device
        • View And Manage Applications Installed On A Device
        • View The Files On A Device
        • View Exported Configurations And Import Profiles
        • View MSI Files Installed On A Device Through Endpoint Manager
        • View And Manage Patches For Windows And 3rd Party Applications
        • View Antivirus Scan History
        • View And Manage Device Group Memberships
        • View Device Logs
      • Manage Mac OS Devices
        • View And Edit Mac OS Device Name
        • Summary Information Of Mac Device
        • View Installed Applications
        • View Quarantined Files
        • View And Manage Profiles Associated With A Device
        • View Mac OS Packages Installed On A Device Through Endpoint Manager
        • View And Manage Device Group Memberships
        • View Mac Device Logs
      • Manage Linux Devices
        • View And Edit Linux Device Name
        • Summary Information Of Linux Device
        • View Network Information Of A Linux Device
        • View And Manage Profiles Associated With A Linux Device
        • View Linux Packages Installed On A Device Through Endpoint Manager
        • View And Manage Device Group Memberships
      • Manage Android Devices
        • View And Edit Device Name
        • View Summary Information
        • Manage Installed Applications
        • View And Manage Profiles Associated With A Device
        • View Sneak Peek Pictures To Locate Lost Devices
        • View The Location Of The Device
        • View And Manage Device Group Memberships
      • Manage IOS Devices
        • View Summary Information Of An IOS Device
        • View And Edit Device Name Of An IOS Device
        • View Applications Installed On An IOS Device
        • View And Manage Profiles Associated With An IOS Device
        • View The Location Of An IOS Device
        • View And Manage Group Memberships Of An IOS Device
      • View User Information
      • Remove A Device
      • Remote Management Of Windows And Mac OS Devices
        • Transfer Items To / From The Remote Computer
      • Remotely Manage Folders And Files On Windows Devices
      • Manage Processes On Remote Windows Devices
      • Manage Services On Remote Windows Devices
      • Use The Command Prompt On Remote Windows Devices
      • Apply Procedures To Windows And Mac Devices
      • Remotely Install And Manage Packages On Windows Devices
      • Remotely Install Packages On Mac OS Devices
      • Remotely Install Packages On Linux Devices
      • Send Enrollment Link To IOS Devices
      • Install Apps On Android/iOS Devices
      • Generate An Alarm On Android Devices
      • Remotely Lock Mobile And Mac OS Devices
      • Wipe Selected Mobile And Mac Devices
      • Assign Configuration Profiles To Selected Devices
      • Set / Reset Screen Lock Password For Mobile Devices
      • Update Device Information
      • Send Text Messages To Mobile Devices
      • Restart Selected Windows Devices
      • Shutdown Windows Devices
      • Wake Offline Device
      • Change A Devices Owner
      • Change The Ownership Status Of A Device
      • Add Custom Notes And Tags On Devices
      • Generate Device List Report
    • Bulk Enrollment Of Devices
      • Enroll Windows, Mac OS And Linux Devices By Installing The Communication Client
        • Enroll Windows Devices Via AD Group Policy
        • Enroll Windows, Mac OS And Linux Devices By Offline Installation Of Agent
        • Enroll Windows Devices Using Auto Discovery And Deployment Tool
      • Enroll The Android And IOS Devices Of AD Users
    • Download And Install The Remote Control Tool
  • Users And User Groups
    • Manage Users
      • Create New User Accounts
        • Manually Add Users
        • Import Users From A CSV File
      • Enroll User Devices For Management
        • Enroll Android Devices
        • Enroll IOS Devices
        • Enroll Windows Endpoints
        • Enroll Mac OS Endpoints
        • Enroll Linux OS Endpoints
      • View User Details
        • Update The Details Of A User
      • Assign Configuration Profiles To User Devices
      • Remove A User
      • Generate New Password For A User
      • Reset Two Factor Authentication Token For A User
      • Run Procedures On User Devices
    • Manage User Groups
      • Create A New User Group
      • Edit A User Group
      • Assign Configuration Profiles To A User Group
      • Remove A User Group
      • Run Procedures On Group Devices
    • Configure Role Based Access Control For Users
      • Create A New Role
      • Manage Permissions And Users Assigned To A Role
      • Remove A Role
      • Manage Roles Assigned To A User
  • Configuration Templates
    • Create Configuration Profiles
      • Profiles For Android Devices
      • Profiles For IOS Devices
      • Profiles For Windows Devices
        • Create Windows Profiles
          • Associated Devices Settings
          • Remote Control Settings
          • Client Access Control
          • Client Proxy Settings
          • Communication Client Update Settings
          • Client UI Settings
          • Remote Tools Settings
          • Monitors
          • Procedure Settings
          • Patch Management Settings
          • Maintenance Window Settings
          • Global Proxy Settings
          • Communication Client Rebranding
          • Client Logging Settings
          • Antivirus Settings
          • Firewall Settings
          • HIPS Settings
          • File Rating Settings
          • Containment Settings
          • VirusScope Settings
          • Xcitium Verdict Cloud
          • Agent Discovery Settings
          • External Devices Control Settings
          • Miscellaneous Settings
          • Script Analysis Settings
          • Data Loss Prevention Settings
          • Xcitium Client Security Access Control
          • XCS Updates
          • Xcitium Client Security UI Settings
          • XCS Logging Settings
          • Thumbnails Settings
          • Performance Settings
          • Chat Settings
        • Import Windows Profiles
      • Profiles For Mac OS Devices
        • Create A Mac OS Profile
          • Antivirus Settings For Mac OS Profile
          • Certificate Settings For Mac OS Profile
          • Restrictions Settings For Mac OS Profile
          • VPN Settings For Mac OS Profile
          • Wi-Fi Settings For Mac OS Profile
          • Remote Control Settings For Mac OS Profile
          • External Device Control Settings For Mac OS Profile
          • Valkyrie Settings For MacOS Profile
          • Procedure Settings For Mac Profiles
          • Monitor Settings For Mac OS Profile
      • Profiles For Linux Devices
        • Create A Linux Profile
          • Antivirus Settings For Linux Profile
          • Communication Client And Comodo Client - Security Application Update Settings For Linux Profile
          • User Interface Settings For Linux Profile
          • Logging Settings For Linux Profile
          • Clients Access Control Settings For Linux Profile
          • Valkyrie Settings For Linux Profile
    • View And Manage Profiles
      • Export And Import Configuration Profiles
      • Clone A Profile
    • Edit Configuration Profiles
    • Manage Default Profiles
    • Manage Alerts
      • Create A New Alert
      • Edit / Delete An Alert
    • Manage Procedures
      • View And Manage Procedures
      • Create A Custom Procedure
      • Combine Procedures To Build Broader Procedures
      • Review / Approve / Decline New Procedures
      • Add A Procedure To A Profile / Procedure Schedules
      • Import / Export / Clone Procedures
      • Change Alert Settings
      • Apply Procedures To Devices
      • Edit / Delete Procedures
      • View Procedure Results
    • Manage Monitors
      • Create Monitors And Add Them To Profiles
        • Monitors For Windows Devices
        • Monitors For Mac OS Devices
      • View And Edit Monitors
    • Data Loss Prevention Rules
      • Create DLP Discovery Rules And Add Them To Profiles
      • View And Edit DLP Discovery Rules
      • Create DLP Monitoring Rules And Add Them To Profiles
      • View And Edit DLP Monitoring Rules
  • Security Systems
    • Security Dashboards
      • View Security Events By Time
      • View Security Events By Files
      • View Security Events By Device
    • View Contained Applications
    • Manage File Trust Ratings On Windows Devices
      • File Ratings Explained
    • View List Of Valkyrie Analyzed Files
    • Antivirus And File Rating Scans
      • Run Antivirus And/or File Rating Scans On Devices
      • Handle Malware On Scanned Devices
      • Update Virus Signature Database On Windows, Mac OS And Linux Devices
    • View And Manage Identified Malware
    • View And Manage Quarantined Items
    • View Android Threat History
    • View And Manage Autorun Items
    • View History Of External Device Connection Attempts
    • Data Loss Prevention Scans
      • DLP Logs
      • DLP Quarantined Files
  • Network Management
    • Create And Run Network Discovery Tasks
    • Manage Profiles For Network SNMP Devices
    • Manage Network Devices
      • Manage SNMP Devices
        • SNMP Device Details Interface
      • Discovered Devices
    • Manage Network Monitors
  • Application Store
    • IOS Apps
      • Add IOS Apps And Install Them On Devices
      • Manage IOS Apps
    • Android Apps
      • Add Android Apps And Install Them On Devices
      • Manage Android Apps
    • Windows Apps
      • Install Windows Apps On Devices
  • Applications
    • View Applications Installed On Android And IOS Devices
      • Blacklist And Whitelist Applications
    • Patch Management
      • Manage OS Patches On Windows Endpoints
      • Install 3rd Party Application Patches On Windows Endpoints
        • EM Supported 3rd Party Applications
    • View And Manage Applications Installed On Windows Devices
      • Uninstall A Windows Application From Selected Devices
      • Uninstall A Windows Application From All Devices
    • Vulnerability Management
  • License Management
    • Manage Your Licenses
    • Manage License Allocation
    • Bill Forecast
  • Configure Endpoint Manager
    • Email Notifications, Templates And Custom Variables
      • Configure Email Templates
      • Configure Email Notifications
      • Create And Manage Custom Variables
      • Create And Manage Registry Groups
      • Create And Manage COM Groups
      • Create And Manage File Groups
      • View And Manage Pattern Variables
      • View And Manage Keyword Groups
    • Endpoint Manager Portal Configuration
      • Import User Groups From LDAP
      • Configure Communication And Security Client Settings
        • Configure The EM Android Client
          • Configure Android Client General Settings
          • Configure Android Client Antivirus Settings
          • Add Google Cloud Messaging (GCM) Token
        • Add Apple Push Notification Certificate
        • Configure Windows Clients
          • Configure Communication Client Settings
          • Configure Client Security Settings
      • Manage Endpoint Manager Extensions
      • Configure Endpoint Manager Reports
      • Device Removal Settings
      • Account Security Settings
      • Set-up Administrators Time Zone And Language
      • Configure Audit Log Settings
    • Integrate Apple DEP With Endpoint Manager
      • Link Endpoint Manager With Apple DEP
      • Manage Apple DEP Devices
      • Manage Apple DEP Profiles
      • Configure Apple DEP Notifications
    • View Version And Support Information
  • Appendix 1a - Endpoint Manager Services - IP Nos, Host Names And Port Details - EU Customers
  • Appendix 1b - Endpoint Manager Services - IP Nos, Host Names And Port Details - US Customers
  • Appendix 2 – Endpoint Manager License Types
  • Appendix 3 - Pre-configured Profiles
  • About ITarian

View and Manage Identified Malware

  

  • Click 'Security Sub-Systems' > 'Antivirus' > 'Current Malware List' The 'Current Malware List' shows malicious items on which no action has yet been taken. This is malware that has NOT been quarantined or deleted.
  • You can also assign a 'Trusted' rating to an item. Use this option if you think the item is a false positive. The item will not be flagged by future scans.
How do files get on this list?

View the malware list

Take action on the malware 
  • Android devices
  • Windows devices
  • Mac OS devices
  • Linux devices
  • Export malware list
     

    Background. This box explains the conditions under which a file will appear in the current malware list.


    Windows Devices:


    Real-time virus monitor:

    • Threats are shown in the list if:
    • Show antivirus alerts' is disabled and 'Block Threats' is chosen as the default action in the profile active on the device
    OR
    • Show antivirus alerts' is enabled and the user decides to click ‘Ignore’ at the alert
    • Threats are NOT shown in the list if:
    • Show antivirus alerts' is disabled and 'Quarantine Threats' is set as the default action
    OR
    • Show antivirus alerts' is enabled and the user quarantines the threat at an alert
    • To view the settings above:

    • Click 'Configuration Templates' > 'Profiles' > Click the name of any Windows profile > 'Antivirus' tab > Open the 'Realtime Scan' tab
      • See Realtime Scan settings in Antivirus Settings if you need more help with this
      Scheduled and manual scans: 
      • Threats are shown in the list only if 'Automatically clean threats' is disabled in the profile active on the device
      • To view the setting above:
      • Click 'Configuration Templates' > 'Profiles' > Click the name of any Windows profile > 'Antivirus' tab > 'Scans' tab > Click the 'Edit' icon beside a profile > Click the 'Options' bar
      • See Custom Scans in Antivirus Settings if you need more help with this

      Mac OS Devices

      • Threats only appear in this list if 'Auto-Quarantine' is disabled in the profile on the device
      • Threats will NOT appear in this list if:
      • 'Auto quarantine' is enabled in 'Realtime scanning', 'Manual Scanning' and 'Scheduled Scanning'
      • 'Auto quarantine' is disabled but the user chooses to quarantine the item from an alert
      • See Configure Antivirus Settings in Antivirus Settings for Mac OS Profile under Create a Mac OS Profile for more details

      Linux Devices:

      • Threats only appear in this list if 'Auto-Quarantine' is disabled in the profile on the device
      • Threats will NOT appear in this list if:
      • 'Auto quarantine' is enabled in 'Realtime scanning' and 'Scheduled Scanning'
      • 'Auto quarantine' is disabled but the user chooses to quarantine the item from an alert
      • See 'Configure Scanner Settings for CCS for Linux' in Antivirus Settings for Linux Profile in Create a Linux Profile for more details

      Android Devices:

      • Threats are shown in the list if the threat is ignored on the device. This can be because:
      • ‘Manual control’ is selected in Android client antivirus settings, or
      • ‘Automatic response’ is selected with ‘Ignore’ as the response in Android client antivirus settings
      • To view the settings above:
      • Click 'Settings' > 'Portal Set-Up' > ‘Client Settings’ > ‘Android’ > ‘Antivirus’
      • Click here for more information on this setting


      View the malware list 

      • Click 'Security Sub-Systems' > 'Antivirus'
      • Click the 'Current Malware List' tab
      • Click a company or a group to view malware identified on their devices
      Or
      • Select 'Show All' to view malware identified on every device in EM




      Current Malware List - Column Descriptions

      Column Heading

      Description

      OS

       The operating system of the device on which the malware was identified.

      Device Name

      The label of the device on which threats were found.

      If no name was assigned then the model number of the device is used.

      Gray text color shows the device has been offline for the past 24 hours.
      • Click the name of the device to open its device details interface.
      • See Manage Windows Devices, Manage Mac OS Devices, Manage Linux Devices and Manage Android / iOS Devices for more details.

      Application Name

      The label of the infected file.

       

      Package Name / File Path

      Windows, Linux and Mac OS devices - Shows the location of the malware.


      Android devices – Shows the package name or identifier.

      • Click the  icon to copy the package name/ file path to the clipboard.

      File Hash

      The SHA1 hash value of the file.

      • Click the  icon to copy the hash value to the clipboard.

      Signature

      The malware signature.

      • Signatures enable the scanner to identify viruses. Each malware signature represents a snippet of malicious code unique to a virus.
      • The signatures of known-malware are stored in the local antivirus database. This is also known as the 'blacklist'.
      • If the scanner finds a file with a signature that matches one on the blacklist then it raises a virus alert. 

      Detection Date

       Date and time that the malware was discovered.

      Control

      Delete Malware

      Uninstalls/removes the malware infected item from the device.

      • Applies to items identified from devices of all operating systems.

      Ignore Malware

      The item will be allowed to remain on the device.

      • Applies to items identified from Android devices only.

      Quarantine Malware

      Moves the selected items to quarantine on the respective devices.

      • Applies to items identified from Windows, Mac OS and Linux devices.

      Rate as Trusted

      Awards 'Trusted' file rating to the selected items. Please make sure before marking a file as trusted. Use this option only for false positives and genuine items.

      • Applies only to items identified from Windows devices.

      Export

      Save the list of currently displayed threats as a comma separated values (CSV) file.


      The exported .csv is available in 'Dashboard' > 'Reports'.


      See Export the List of Malware for more details.


      • Click any column header to sort items in ascending/descending order
      • Click the funnel icon  on the right to filter items by various criteria
      • Start typing or select the search criteria in the search field to find a particular item and click 'Apply'
      • To display all items again, clear any filters and search criteria and click 'Apply'
      • EM returns 20 results per page when you perform a search. You can increase results up to a maximum of 200.

      Take action on the malware

      • You can uninstall/delete malicious items from the devices on which they were found.
      • Alternatively, if you think an item is a false positive, you have the following options:
      • Ignore malware – Applies to items identified on Android devices only. The item will not be uninstalled and will be skipped in the future scans.
      • Rate as 'Trusted' – Applies to items identified on Windows devices only. The item will be allowed to run and will be skipped in future scans.
      • If an item is found to be suspicious, you can choose to move it to quarantine for later analysis and removal.
      The options at the top of the table let you take actions on selected items. The available actions depend on the operating system of the device(s).




      Threats identified on Android Devices

       

      Action on malware depends on the Android device type. Knox and non-Knox devices. Knox is a security technology used by Samsung for its devices.


      First, select the items on which you want to take the action. Then click one of the following: 

      • Ignore Malware - Select if the item is a false positive. The item will remain on the device and skipped in future scans
      • Delete Malware - Select if you want to remove the malware from the device
      • Knox devices - Applications with viruses or infected files on the devices and from the SD card are deleted without any alert on the device
      • Non-Knox devices - Infected files on the SD card are deleted without any alert. The following notification is sent to the affected device for removal of malware on the device



      • Touch the alert to view a list of all items which are ready to be removed:



      • Tap on the malware to be removed, confirm the removal in the next dialog and follow the uninstall wizard.


      Threats identified on Windows Devices:


      First, select the items on which you want to take the action. Then click one of the following:

      • Delete Malware - Will remove the malware from the device.
      • Quarantine Malware - The items will be moved to quarantine on the respective devices. You can delete the items from quarantine later, or restore them to their original locations. See View and Manage Quarantined Items for more details.
      • Rate as Trusted - Trusted files are considered safe to run. Trusted items can run outside the container on devices and will be skipped in future scans. See File Ratings Explained for more details on trust ratings of files.


      Threats identified on Mac OS Devices:


      First, select the items on which you want to take the action. Then click one of the following:

      • Delete Malware - Will remove the malware from the device.
      • Quarantine Malware - The items will be moved to quarantine on the respective devices. You can delete the items from quarantine later, or restore them to their original locations. See View and Manage Quarantined Items for more details.

      Threats identified on Linux Devices:


      First, select the items on which you want to take the action. Then click one of the following:

      • Delete Malware - Will remove the malware from the device.
      • Quarantine Malware - The items will be moved to quarantine on the respective devices. You can delete the items from quarantine later, or restore them to their original locations. See View and Manage Quarantined Items for more details.

      Export the malware list as a CSV file

      • Click 'Security Sub-Systems' > 'Antivirus' > 'Current Malware List' tab
      • Click the funnel  icon to filter which records are included in the report.
      • Click the 'Export' button and choose 'Export to CSV':



       

      • The .csv file will be available in 'Dashboard' > 'Reports'

      • See Reports in The Dashboard for more details.

      Comodo Help
      • IT Platform:
      • Help
      • Scripts
      • Wiki
      • Forum
      • Developer
      • RMM
      • Patch Management
      • Service Desk
      • ITSM
      • Managed Service Provider
      • Managed Detection and Response
      • Ticketing System
      • Helpdesk
      • ITIL

      Copyright 2025 Itarian