How to Audit and Neutralize Detected Threats
When the scanner detects a threat, it automatically isolates the file to prevent further execution. Follow this manual to manage quarantined items.
Step 1: Access the Quarantine Ledger
- Navigate to the "Quarantine" tab in the Malware Security module.
- Review the list of isolated files. Each entry displays the Threat Identity (Virus Name) and the Detection Path.
Step 2: Executing Actions
For each quarantined item, you have three options:
- Restore: If the detection was a false positive, click Restore to move the file back to its original path and grant it execution rights.
- Permanent Wipe: Click the trash icon to erase the malicious code from the server disk permanently.
- View Logic: Open the file in read-only mode to audit the code before taking action.
Step 3: Post-Cleaning Synchronization
After wiping threats, it is recommended to Refresh the Website Management ledger to ensure all virtual hosts are functioning correctly without the malicious items.
SECURITY HARDENING: If a user account has multiple threats in quarantine, consider suspending the user temporarily until the vulnerability (e.g., outdated CMS) is patched.