Clean Recovery

After file anomalies are found, you can mark them corrupt so they will be quarantined at the index layer. This ensures that any restore operations will recover clean versions of the files.

Before You Begin

  • Analyze file data-related anomalies on a client. For more information, see Analyzing File Data.

Procedure

  1. From the navigation pane in the Command Center, click Monitoring > Threat Indicators.

    The Threat Indicators panel appears.

  2. Click the action button action_button for a client, and then click Details.

    The File data tab for the client appears.

  3. In the Suspicious files table, click the down arrow down arrow icon next to a file path to see all file versions for a set of files.

  4. To mark a version of a file as corrupt, click the action button action_button, and then click Mark corrupt.

    A confirmation dialog box appears.

  5. Click Yes.

Page contents

×

Loading...