Comodo Help
Find the desired product help
Comodo Cloud Antivirus

Comodo Cloud Antivirus

Version 1.20

English

Print Help Download Help
View And Manage Quarantined Items
  • Introduction To Comodo Cloud Antivirus
    • System Requirements
    • Installation
    • Start Comodo Cloud Antivirus
      • The Main Interface
      • The Widget
      • The System Tray Icon
    • Lucky You Statistics
    • Understand CCAV Alerts
  • Scan And Clean Your Computer
    • Run A Quick Scan
    • Run A Full Computer Scan
    • Run A Certificate Scan
    • Run A Custom Scan
      • Scan A Folder
      • Scan A File
    • Process Infected Files
    • Manage Detected Threats
    • View Valkyrie Analysis Results
  • The Sandbox
    • Run An Application Or Browser In The Sandbox
    • Manage Sandboxed Items
      • Review Files
  • View CCAV Logs
    • Antivirus Logs
    • Executed Application Logs (Sandbox Logs)
    • Setting Changes Logs
    • Scan Actions Logs
  • View And Manage Quarantined Items
  • CCAV Settings
    • General Settings
      • Customize User Interface
      • Configure Program Updates
    • Antivirus Settings
      • Antivirus Settings
      • Exclusions
    • Sandbox Settings
      • Sandbox Settings
      • Sandbox Rules
      • Protected Files/Folders
      • Track Files Created In The Sandbox
    • File Rating Settings
      • File Rating Settings
      • Trusted Applications
      • Submitted Applications
      • Trusted Vendors
    • Advanced Protection Settings
      • Browser Settings Protection
      • Miscellaneous Protection Settings
  • Get Live Support
  • Viruscope - Feature Spotlight
  • Comodo Internet Security Essentials
    • Understand Alerts And Configure Exceptions
  • Comodo Support And About Information
  • Appendix 1 - How To Tutorials
    • Enable / Disable AV, Sandbox And Game Mode
    • Run An Antivirus Scan On Selected Items
    • Block Incoming / Outgoing Internet Connection To Sandboxed Applications
    • Add Exclusions By Allowing Internet Connection To Sandboxed Applications
    • Enable/ Disable Realtime Scan
    • Run A Virus Scan On Your Computer
    • Run An Application Or Browser In The Sandbox
    • Run A Certificate Scan On Your Computer
    • Configure Antivirus Exclusions
    • View Lucky You Statistics
    • Switch Off Automatic Antivirus And Software Updates
    • Enable/ Disable Browser Settings Protection
    • Evaluate The Behavior Of Unknown Files In The Sandbox
    • Detect Potentially Unwanted Applications (PUA)
    • Delete Quarantined Items
    • Restore A Quarantined Item
    • Submit As False Positive
    • Configure Proxy And Host Settings
    • Enable/ Disable Sandbox Indicator
    • Enable / Disable Viruscope
    • Track File Created In The Sandbox
    • Respond To Alerts
    • View CCAV Logs
    • Get Instant Support
    • Uninstall CCAV
    • Add Exclusions To Contained Folders And Files
    • Give Contained Applications Write Access To Local Folders
    • Quickly Create An Execution Rule For A Program
  • About Comodo Security Solutions

View and Manage Quarantined Items

 

  • The 'Quarantine' interface displays a list of files which have been isolated by Comodo Cloud Antivirus to prevent them from infecting your system.
  • Items are generally placed in quarantine as a result of an on-demand or real time antivirus scan. Any files transferred to quarantine are encrypted, meaning they cannot be run or executed.
  • You can also manually quarantine items that are suspicious. Conversely, you can restore a file to its original location if you think it has been quarantined in error, and/or submit files as false positives to Comodo for analysis. 
  • Click 'View Quarantine' on the main interface

    OR

    • Click the 'Quarantine' icon  on the CCAV desktop widget




    Column Descriptions

      • Date/Time – The precise date and time at which the item was moved to quarantine
      • Virus Name – The name of the malware that was quarantined
      • Path – The location where the file was discovered
      • Action - Displays a drop-down with options for handling the item.


      The available actions are:

      • Restore – The item will be restored to its original location. However, subsequent scans will still identify it as malicious and will quarantine the file.
      • Restore and Trust – The item will be restored to its original location and will be added to 'Trusted Applications' list in your local file list. The file will be excluded from future scans.
      • Delete – The item will be removed from your computer.

      You can also apply an action to all quarantined items at once using the 'Apply this action for all' drop-down at bottom right:



       

      • To filter items based on the actions to be executed on them, click the funnel icon in the 'Action' column:




      The 'Quarantine' interface also allows you to:

      • Manually add items to quarantine
      • Delete quarantine items
      • Restore a quarantined item to its original location
      • Submit false positives to Comodo for analysis

      Manually adding files as Quarantined Items


      Files or folders that you are suspicious of can be manually moved to quarantine:


      To manually add a Quarantined Item

      • Right-click anywhere inside the 'Quarantine' interface and choose 'Add'
      • Navigate to the file you want to add to quarantine and click 'Open'.




      • Click 'Apply' to quarantine the file


      To delete quarantined item(s)

      • To delete a single item, choose 'Delete' from the 'Action' drop-down in the item row.
      • To delete all the quarantined items at once, choose 'Delete' from the drop-down beside 'Apply this action to all' at the bottom right of the interface.
      • Click 'Apply' for your changes to take effect.

      The file(s) will be deleted from the system permanently.


      To restore quarantined item(s) to its/their original location(s)

      • To restore a single item, choose 'Restore' from the 'Action' drop-down in the item row.
      • To restore a single item and exclude it from future scans, choose 'Restore and Trust' from the 'Action' drop-down in the item row.
      • To restore all items, choose 'Restore' from the 'Apply this action to all' drop-down at bottom right.
      • To restore all items and exclude them from future scans, choose 'Restore and Trust' from the 'Apply this action to all' drop-down at bottom right.
      • Click 'Apply' for your changes to take effect.
      Any restored files will be moved back to their original locations.


      To submit a selected quarantined item to Comodo for analysis

      • Select the item from the 'Quarantine' interface, right click on it and choose 'Submit as False Positive' from the options.




      • Click 'Apply' for your changes to take effect

      You can submit suspicious files to Comodo for deeper analysis. You can also submit files which you think are safe but have been identified as malware by CCAV (false positives). Comodo will analyze all submitted files.

      • If they are found to be trustworthy, they will be added to the Comodo safe list (whitelisted).
      • Conversely, if they are found to be malicious then they will be added to the database of virus signatures (blacklisted).

      Note: Quarantined files are strongly encrypted, cannot be executed and do not constitute any danger to your computer.


      Our Products
      • Free Antivirus
      • Free Internet Security
      • Website Malware Removal
      • Free Anti-Malware
      • Anti-Spam (Free Trial)
      • Windows Antivirus
      • Antivirus for Windows 7
      • Antivirus for Windows 8
      • Antivirus for Windows 10
      • Antivirus for MAC
      • Antivirus for Linux
      • Free Endpoint Security
      • Free ModSecurity
      • Free RMM
      • Free Website Malware Scanner
      • Free Device Manager for Android
      • Free Demo
      • Network Security
      • Endpoint Protection
      • Antivirus for Android
      • Comodo Antivirus
      • Wordpress Security
      Cheap CDN
      • Bootstrap CDN
      • Semantic UI CDN
      • Jquery CDN
      • CDN Plans
      • CDN
      • Free CDN
      Enterprise
      • Patch Management Software
      • Patch Manager
      • Service Desk
      • Website Down
      • Endpoint Protection Solutions
      • Website Security Check
      • Remote Monitoring and Management
      • Website Security
      • Device Manager
      • ITSM
      • CRM
      • MSP
      • Android Device Manager
      • MDR Services
      • Managed IT Support Services
      • Free EDR
      Free SSL Certificate
      Support Partners Terms and Conditions Privacy Policy

      © Comodo Group, Inc. 2025. All rights reserved.