How to Audit and Neutralize Detected Threats

When the scanner detects a threat, it automatically isolates the file to prevent further execution. Follow this manual to manage quarantined items.

Step 1: Access the Quarantine Ledger

  1. Navigate to the "Quarantine" tab in the Malware Security module.
  2. Review the list of isolated files. Each entry displays the Threat Identity (Virus Name) and the Detection Path.

Step 2: Executing Actions

For each quarantined item, you have three options:

  • Restore: If the detection was a false positive, click Restore to move the file back to its original path and grant it execution rights.
  • Permanent Wipe: Click the trash icon to erase the malicious code from the server disk permanently.
  • View Logic: Open the file in read-only mode to audit the code before taking action.
[IMAGE_PLACE_HOLDER: Quarantine Step - Screenshot of the infected files list with action buttons.]

Step 3: Post-Cleaning Synchronization

After wiping threats, it is recommended to Refresh the Website Management ledger to ensure all virtual hosts are functioning correctly without the malicious items.

SECURITY HARDENING: If a user account has multiple threats in quarantine, consider suspending the user temporarily until the vulnerability (e.g., outdated CMS) is patched.