ITarian Help

Find the desired product help

IT Endpoint Manager

IT Endpoint Manager

Endpoint Manager Administrator Guide 6.43

English

Print Help Download Help
Security Systems > View And Manage Quarantined Items
  • Introduction To Endpoint Manager
    • Key Concepts
    • Best Practices
    • Quick Start
    • Sign Up For An ITarian Account
    • Login Into The Admin Console
  • The Admin Console
  • The Dashboard
  • Devices And Device Groups
    • Manage Device Groups
      • Create Device Groups
      • Edit A Device Group
      • Assign Configuration Profiles To A Device Group
      • Remove A Device Group
      • Run Procedures On Customer Groups
    • Manage Devices
      • Add New Devices
      • Manage Windows Devices
        • View And Edit Device Name
        • View Summary Information
        • View Hardware Information
        • View Network Information
        • View Maintenance Windows Associated With Device
        • View And Manage Profiles Associated With A Device
        • View And Manage Applications Installed On A Device
        • View The Files On A Device
        • View Exported Configurations And Import Profiles
        • View MSI Files Installed On A Device Through Endpoint Manager
        • View And Manage Patches For Windows And 3rd Party Applications
        • View Antivirus Scan History
        • View And Manage Device Group Memberships
        • View Device Logs
      • Manage Mac OS Devices
        • View And Edit Mac OS Device Name
        • Summary Information Of Mac Device
        • View Installed Applications
        • View Quarantined Files
        • View And Manage Profiles Associated With A Device
        • View Mac OS Packages Installed On A Device Through Endpoint Manager
        • View And Manage Device Group Memberships
        • View Mac Device Logs
      • Manage Linux Devices
        • View And Edit Linux Device Name
        • Summary Information Of Linux Device
        • View Network Information Of A Linux Device
        • View And Manage Profiles Associated With A Linux Device
        • View Linux Packages Installed On A Device Through Endpoint Manager
        • View And Manage Device Group Memberships
      • Manage Android Devices
        • View And Edit Device Name
        • View Summary Information
        • Manage Installed Applications
        • View And Manage Profiles Associated With A Device
        • View Sneak Peek Pictures To Locate Lost Devices
        • View The Location Of The Device
        • View And Manage Device Group Memberships
      • Manage IOS Devices
        • View Summary Information Of An IOS Device
        • View And Edit Device Name Of An IOS Device
        • View Applications Installed On An IOS Device
        • View And Manage Profiles Associated With An IOS Device
        • View The Location Of An IOS Device
        • View And Manage Group Memberships Of An IOS Device
      • View User Information
      • Remove A Device
      • Remote Management Of Windows And Mac OS Devices
        • Transfer Items To / From The Remote Computer
      • Remotely Manage Folders And Files On Windows Devices
      • Manage Processes On Remote Windows Devices
      • Manage Services On Remote Windows Devices
      • Use The Command Prompt On Remote Windows Devices
      • Apply Procedures To Windows And Mac Devices
      • Remotely Install And Manage Packages On Windows Devices
      • Remotely Install Packages On Mac OS Devices
      • Remotely Install Packages On Linux Devices
      • Send Enrollment Link To IOS Devices
      • Install Apps On Android/iOS Devices
      • Generate An Alarm On Android Devices
      • Remotely Lock Mobile And Mac OS Devices
      • Wipe Selected Mobile And Mac Devices
      • Assign Configuration Profiles To Selected Devices
      • Set / Reset Screen Lock Password For Mobile Devices
      • Update Device Information
      • Send Text Messages To Mobile Devices
      • Restart Selected Windows Devices
      • Shutdown Windows Devices
      • Wake Offline Device
      • Change A Devices Owner
      • Change The Ownership Status Of A Device
      • Add Custom Notes And Tags On Devices
      • Generate Device List Report
    • Bulk Enrollment Of Devices
      • Enroll Windows, Mac OS And Linux Devices By Installing The Communication Client
        • Enroll Windows Devices Via AD Group Policy
        • Enroll Windows, Mac OS And Linux Devices By Offline Installation Of Agent
        • Enroll Windows Devices Using Auto Discovery And Deployment Tool
      • Enroll The Android And IOS Devices Of AD Users
    • Download And Install The Remote Control Tool
  • Users And User Groups
    • Manage Users
      • Create New User Accounts
        • Manually Add Users
        • Import Users From A CSV File
      • Enroll User Devices For Management
        • Enroll Android Devices
        • Enroll IOS Devices
        • Enroll Windows Endpoints
        • Enroll Mac OS Endpoints
        • Enroll Linux OS Endpoints
      • View User Details
        • Update The Details Of A User
      • Assign Configuration Profiles To User Devices
      • Remove A User
      • Generate New Password For A User
      • Reset Two Factor Authentication Token For A User
      • Run Procedures On User Devices
    • Manage User Groups
      • Create A New User Group
      • Edit A User Group
      • Assign Configuration Profiles To A User Group
      • Remove A User Group
      • Run Procedures On Group Devices
    • Configure Role Based Access Control For Users
      • Create A New Role
      • Manage Permissions And Users Assigned To A Role
      • Remove A Role
      • Manage Roles Assigned To A User
  • Configuration Templates
    • Create Configuration Profiles
      • Profiles For Android Devices
      • Profiles For IOS Devices
      • Profiles For Windows Devices
        • Create Windows Profiles
          • Associated Devices Settings
          • Remote Control Settings
          • Client Access Control
          • Client Proxy Settings
          • Communication Client Update Settings
          • Client UI Settings
          • Remote Tools Settings
          • Monitors
          • Procedure Settings
          • Patch Management Settings
          • Maintenance Window Settings
          • Global Proxy Settings
          • Communication Client Rebranding
          • Client Logging Settings
          • Antivirus Settings
          • Firewall Settings
          • HIPS Settings
          • File Rating Settings
          • Containment Settings
          • VirusScope Settings
          • Xcitium Verdict Cloud
          • Agent Discovery Settings
          • External Devices Control Settings
          • Miscellaneous Settings
          • Script Analysis Settings
          • Data Loss Prevention Settings
          • Xcitium Client Security Access Control
          • XCS Updates
          • Xcitium Client Security UI Settings
          • XCS Logging Settings
          • Thumbnails Settings
          • Performance Settings
          • Chat Settings
        • Import Windows Profiles
      • Profiles For Mac OS Devices
        • Create A Mac OS Profile
          • Antivirus Settings For Mac OS Profile
          • Certificate Settings For Mac OS Profile
          • Restrictions Settings For Mac OS Profile
          • VPN Settings For Mac OS Profile
          • Wi-Fi Settings For Mac OS Profile
          • Remote Control Settings For Mac OS Profile
          • External Device Control Settings For Mac OS Profile
          • Valkyrie Settings For MacOS Profile
          • Procedure Settings For Mac Profiles
          • Monitor Settings For Mac OS Profile
      • Profiles For Linux Devices
        • Create A Linux Profile
          • Antivirus Settings For Linux Profile
          • Communication Client And Comodo Client - Security Application Update Settings For Linux Profile
          • User Interface Settings For Linux Profile
          • Logging Settings For Linux Profile
          • Clients Access Control Settings For Linux Profile
          • Valkyrie Settings For Linux Profile
    • View And Manage Profiles
      • Export And Import Configuration Profiles
      • Clone A Profile
    • Edit Configuration Profiles
    • Manage Default Profiles
    • Manage Alerts
      • Create A New Alert
      • Edit / Delete An Alert
    • Manage Procedures
      • View And Manage Procedures
      • Create A Custom Procedure
      • Combine Procedures To Build Broader Procedures
      • Review / Approve / Decline New Procedures
      • Add A Procedure To A Profile / Procedure Schedules
      • Import / Export / Clone Procedures
      • Change Alert Settings
      • Apply Procedures To Devices
      • Edit / Delete Procedures
      • View Procedure Results
    • Manage Monitors
      • Create Monitors And Add Them To Profiles
        • Monitors For Windows Devices
        • Monitors For Mac OS Devices
      • View And Edit Monitors
    • Data Loss Prevention Rules
      • Create DLP Discovery Rules And Add Them To Profiles
      • View And Edit DLP Discovery Rules
      • Create DLP Monitoring Rules And Add Them To Profiles
      • View And Edit DLP Monitoring Rules
  • Security Systems
    • Security Dashboards
      • View Security Events By Time
      • View Security Events By Files
      • View Security Events By Device
    • View Contained Applications
    • Manage File Trust Ratings On Windows Devices
      • File Ratings Explained
    • View List Of Valkyrie Analyzed Files
    • Antivirus And File Rating Scans
      • Run Antivirus And/or File Rating Scans On Devices
      • Handle Malware On Scanned Devices
      • Update Virus Signature Database On Windows, Mac OS And Linux Devices
    • View And Manage Identified Malware
    • View And Manage Quarantined Items
    • View Android Threat History
    • View And Manage Autorun Items
    • View History Of External Device Connection Attempts
    • Data Loss Prevention Scans
      • DLP Logs
      • DLP Quarantined Files
  • Network Management
    • Create And Run Network Discovery Tasks
    • Manage Profiles For Network SNMP Devices
    • Manage Network Devices
      • Manage SNMP Devices
        • SNMP Device Details Interface
      • Discovered Devices
    • Manage Network Monitors
  • Application Store
    • IOS Apps
      • Add IOS Apps And Install Them On Devices
      • Manage IOS Apps
    • Android Apps
      • Add Android Apps And Install Them On Devices
      • Manage Android Apps
    • Windows Apps
      • Install Windows Apps On Devices
  • Applications
    • View Applications Installed On Android And IOS Devices
      • Blacklist And Whitelist Applications
    • Patch Management
      • Manage OS Patches On Windows Endpoints
      • Install 3rd Party Application Patches On Windows Endpoints
        • EM Supported 3rd Party Applications
    • View And Manage Applications Installed On Windows Devices
      • Uninstall A Windows Application From Selected Devices
      • Uninstall A Windows Application From All Devices
    • Vulnerability Management
  • License Management
    • Manage Your Licenses
    • Manage License Allocation
    • Bill Forecast
  • Configure Endpoint Manager
    • Email Notifications, Templates And Custom Variables
      • Configure Email Templates
      • Configure Email Notifications
      • Create And Manage Custom Variables
      • Create And Manage Registry Groups
      • Create And Manage COM Groups
      • Create And Manage File Groups
      • View And Manage Pattern Variables
      • View And Manage Keyword Groups
    • Endpoint Manager Portal Configuration
      • Import User Groups From LDAP
      • Configure Communication And Security Client Settings
        • Configure The EM Android Client
          • Configure Android Client General Settings
          • Configure Android Client Antivirus Settings
          • Add Google Cloud Messaging (GCM) Token
        • Add Apple Push Notification Certificate
        • Configure Windows Clients
          • Configure Communication Client Settings
          • Configure Client Security Settings
      • Manage Endpoint Manager Extensions
      • Configure Endpoint Manager Reports
      • Device Removal Settings
      • Account Security Settings
      • Set-up Administrators Time Zone And Language
      • Configure Audit Log Settings
    • Integrate Apple DEP With Endpoint Manager
      • Link Endpoint Manager With Apple DEP
      • Manage Apple DEP Devices
      • Manage Apple DEP Profiles
      • Configure Apple DEP Notifications
    • View Version And Support Information
  • Appendix 1a - Endpoint Manager Services - IP Nos, Host Names And Port Details - EU Customers
  • Appendix 1b - Endpoint Manager Services - IP Nos, Host Names And Port Details - US Customers
  • Appendix 2 – Endpoint Manager License Types
  • Appendix 3 - Pre-configured Profiles
  • About ITarian

View and Manage Quarantined Items


      Click 'Security Sub-Systems' > 'Antivirus' > 'Quarantined Files' to open the quarantine interface
          • Quarantine is a secure holding area for potentially dangerous files. Quarantined files pose no threat to your system.
          • You can delete or restore quarantined items, or assign a file rating to them.
          • File ratings determine how CCS handles the file:
          • Files rated as 'Malicious' will stay in quarantine on the device.
          • Files rated as 'Unrecognized' will be restored to their original locations on the device. Future virus scans may flag them as malicious again.
          • Files rated as 'Trusted' will be restored to their original locations on the device. These files are skipped in future virus scans.


             How do threats quarantined?


            Windows Devices


            Real time scans - Threats are placed in quarantine if:

            • 'Show antivirus alerts' is disabled and 'Quarantine Threats' is set as the default action in the profile on the device. This setting is in the 'Realtime Scan Settings' area of the profile's antivirus section.
            • 'Show antivirus alerts' is enabled and the end-user quarantined the threat at an alert.
            • See Realtime Scan settings if you want to read more about the antivirus section of a profile.

            On-demand / Scheduled scans - Threats are placed in quarantine if:

            • 'Automatically clean threats' is enabled and 'Quarantine' is set as the action in the profile on the device.
            • See Custom Scans in Antivirus Settings if you need more help with this.

            DLP Scans

            • Documents quarantined by a Data Loss Prevention (DLP) scan are NOT shown in this interface. They are placed in a different quarantine area.
            • You can view DLP quarantined files at ‘Security Sub-Systems‘ > ‘Data Loss Prevention’ > ‘Logs’
            • You cannot restore DLP quarantined files remotely using Endpoint Manager. You can only restore them through Comodo Client Security on the endpoint.

            Manual quarantine:
            • Admins can move threats to quarantine from the 'Current Malware List' interface.
            • End-users can move files to quarantine on their endpoint.
            • See View and Manage Identified Malware for more details.

             

            MAC OS Devices


            Real time scans - Threats are placed in quarantine if:

            • 'Automatically quarantine threats found during scanning' is enabled is enabled in the profile on the device. This setting is in the 'Realtime Scan Settings' area of the profile's antivirus section.
            • The end-user chooses to quarantine the threat at an alert
            • See the explanation of Realtime Scanner settings in the section Antivirus Settings for Mac OS Profile under Create a Mac OS Profile

            On-demand / Scheduled scans - Threats are quarantine if:

            • 'Automatically quarantine threats found during scanning' is enabled in the profile on the device
            • See Manual Scanner settings and Scheduled Scanner settings for more help with this

            Manual quarantine:

            • An administrator moved a threat to quarantine from the 'Current Malware List' interface
            • An end-user moved a file to quarantine on the endpoint
            • See View and Manage Identified Malware for more details. 

             

            Linux Devices


            Real time scans - Threats are quarantine if:

            • 'Automatically quarantine threats found during scanning' is enabled in the profile on the device. This setting is in the 'Realtime Scan Settings' area of the profile's antivirus section.
            • The end-user chooses to quarantine the threat at an alert
            • See Realtime Scanner settings for more help with this under Create a Linux Profile

            On-demand / Scheduled scans - Threats will be placed in quarantine if:

            • 'Automatically quarantine threats found during scanning' is enabled in the profile on the device
            • See Realtime Scanner settings and Scheduled Scanner settings to view help on these settings.

            Manual quarantine:

            • An administrator moved a threat to quarantine from the 'Current Malware List' interface
            • An end-user moved a file to quarantine on the endpoint
            • See View and Manage Identified Malware for more details.

            Items moved to quarantine are encrypted and not allowed to run.


            Open the quarantine interface
            • Click 'Security Sub-Systems' > 'Antivirus'
            • Click the 'Quarantined Files' tab
            • Select a company or a group to view malware identified on their devices
            Or
            • Select 'Show All' on the left menu to view malware identified on all devices enrolled to EM




            'Quarantine Files' - Table of Column Descriptions

            Column Heading

            Description

            OS

            The operating system of the device at which the item was quarantined.

            File Name

            The file that was moved to quarantine.

            • Click the name of a file to view its details.
            • See View details of a quarantined item for more details.

            Hash

            The SHA1 hash value of the quarantined file

            • Click the  icon to copy the hash value to the clipboard.

            Signature

            The name of the identified malware. 'User Item' indicates the file was moved to quarantine manually by the user on the endpoint.

            Comodo Rating

            The file's trust level as rated by CCS.

            Admin Rating

            The trust rating of the file as set by the administrator. Files can be rated as trusted, malicious or unrecognized.

            Devices Detected On

            The number of devices on which the item was quarantined.

            • Click the number to view the list of devices on which the item was quarantined
            • See the explanation of Device Details given below

            First Quarantined

            Date and time at which the malware was identified and quarantined the first time.


            The quarantine interface allows you to: 

            • View details of a quarantined item
            • Restore False Positives from Quarantine
            • Remove Malware files from the devices
            • Rate files as 'Unrecognized', 'Trusted' or 'Malicious'
            • Export the list of quarantined files as a CSV file

            View Details of a Quarantined Item

            • Click 'Security Sub-Systems' > 'Antivirus' > 'Quarantined Files'
            • Click on the file name of an item in the list:



            • This will open the file details interface which shows:
            • File Info - General information such as OS, file-name, hash, file rating, number of devices on which the file was quarantined, and more.
            • Device List - Shows list of endpoints upon which the file was found with their details like installation path of the file on each device, the device owner and the date and time at which the file was quarantined.

            Device Details




            The options on the top let you to:

            • Restore False Positives from Quarantine on a device
            • Remove the item from a device
            • Rate files as 'Unrecognized', 'Trusted' or 'Malicious'
            • See the following sections for more details


            Manage Quarantine Items
            • If your review confirms that a quarantined item is a genuine threat then it can be deleted from endpoints.
            • Conversely, if an item is is found to be a false positive, you can restore it to its original location.
            • You can also rate a file as unrecognized, trusted or malicious based on your assessment. The new verdict will be sent to all endpoints and will be reflected in the 'Unrecognized' and 'Trusted' interfaces.

            Restore False Positives from Quarantine
            • If the identified item is a false positive, select the item from the list and click 'Restore File(s) on Devices' from the options at the top.

            The item will be restored to its original location on all devices and removed from the list.




              Remove Malware files from the devices
              • Select the item(s) from the list and click 'Delete File(s) From Device' from the options at the top.




              • Click 'Confirm' in the confirmation dialog.

              The file will be deleted from all devices at which it was quarantined and removed from the list.

               

              Rate files as 'Unrecognized', 'Trusted' or 'Malicious'

              • If the rating of a quarantined file is changed to 'Trusted' or 'Unrecognized', the file is restored to its original location. The new rating is also stored in the CCS database on the devices.
              • To change the rating of a quarantined file, select it and click the appropriate button at the top:




              A confirmation will be displayed and the information will also be sent to the devices.

              • Files rated as 'Malicious' will stay in quarantine on the device
              • Files rated as 'Unrecognized' will be restored to their original locations on the device. Future AV scans may flag them as 'malicious' again
              • Files rated as 'Trusted' will be restored to their original locations in the device. These files will be white-listed and skipped by future antivirus scans.

              Export quarantined files records as a CSV file

              • Click 'Security Sub-Systems' > 'Antivirus' > 'Quarantined Files' tab
              • Click the funnel  icon to filter which records are included in the report.
              • Click the 'Export' button and choose 'Export to CSV':




              The report will be generated in .csv format.




              The file will be available in 'Dashboard' > 'Reports'. See Reports if you need more help with this interface.


              Comodo Help
              • IT Platform:
              • Help
              • Scripts
              • Wiki
              • Forum
              • Developer
              • RMM
              • Patch Management
              • Service Desk
              • ITSM
              • Managed Service Provider
              • Managed Detection and Response
              • Ticketing System
              • Helpdesk
              • ITIL

              Copyright 2025 Itarian