After file anomalies are found, you can mark them corrupt so they will be quarantined at the index layer. This ensures that any restore operations will recover clean versions of the files.
Before You Begin
- Analyze file data-related anomalies on a client. For more information, see Analyzing File Data.
Procedure
-
From the navigation pane in the Command Center, click Monitoring > Threat Indicators.
The Threat Indicators panel appears.
-
Click the action button
for a client, and then click Details.The File data tab for the client appears.
-
In the Suspicious files table, click the down arrow
next to a file path to see all file versions for a set of files. -
To mark a version of a file as corrupt, click the action button
, and then click Mark corrupt.A confirmation dialog box appears.
-
Click Yes.