Comodo Help
Find the desired product help
Endpoint Manager

Endpoint Manager

Comodo Client Security 12.15

English

Print Help Download Help
General Tasks - Introduction > Manage Quarantined Items
  • Introduction To Comodo Client Security
    • Special Features
    • System Requirements
    • Install Comodo Client Security
    • Start Comodo Client Security
    • The Main Interface
      • The Home Screen
      • The Tasks Interface
      • The Widget
      • The System Tray Icon
    • Understand Security Alerts
    • Password Protection
  • General Tasks - Introduction
    • Scan And Clean Your Computer
      • Run A Quick Scan
      • Run A Full Computer Scan
      • Run A Rating Scan
      • Run A Custom Scan
        • Scan A Folder
        • Scan A File
        • Create, Schedule And Run A Custom Scan
      • Automatically Scan Unrecognized And Quarantined Files
    • Instantly Scan Files And Folders
    • Process Infected Files
    • Manage Virus Database Updates
    • Manage Blocked Autoruns
    • Manage Quarantined Items
  • Firewall Tasks - Introduction
    • Configure Internet Access Rights For Applications
    • Stealth Your Computer Ports
    • Manage Network Connections
    • Stop All Network Activities
    • View Active Internet Connections
  • Containment Tasks - Introduction
    • Run An Application In The Container
    • Reset The Container
    • Identify And Kill Unsafe Running Processes
    • Open Shared Space
    • The Virtual Desktop
      • Start The Virtual Desktop
      • The Main Interface
      • Run Browsers Inside The Virtual Desktop
      • Open Files And Run Applications Inside The Virtual Desktop
      • Pause And Resume The Virtual Desktop
      • Close The Virtual Desktop
    • Containment Statistics Analyzer
  • DLP Tasks - Introduction
    • Run Data Loss Prevention Scans
    • Manage DLP Quarantined Files
  • Advanced Tasks - Introduction
    • Create A Rescue Disk
      • Download And Burn Comodo Rescue Disk
    • Remove Deeply Hidden Malware
    • Manage CCS Tasks
    • View CCS Logs
      • Antivirus Logs
      • VirusScope Logs
      • Firewall Logs
      • HIPS Logs
      • Containment Logs
      • Website Filtering Logs
      • Device Control Logs
      • Autorun Event Logs
      • Alert Logs
      • CCS Tasks Logs
      • File List Changes Logs
      • Vendor List Changes Logs
      • Configuration Changes Logs
      • Virtual Desktop Event Logs
      • Data Loss Prevention Event Logs
      • Search And Filter Logs
    • Submit Files For Analysis To Comodo
    • View Active Process List
  • CCS Advanced Settings
    • General Settings
      • Customize User Interface
      • Configure Virus Database Updates
      • Log Settings
      • Manage CCS Configurations
        • Comodo Preset Configurations
        • Personal Configurations
      • Manage Performance
    • Antivirus Configurations
      • Real-time Scanner Settings
      • Scan Profiles
    • Firewall Configuration
      • General Firewall Settings
      • Application Rules
      • Global Rules
      • Firewall Rule Sets
      • Network Zones
        • Network Zones
        • Blocked Zones
      • Port Sets
    • HIPS Configuration
      • HIPS Settings
      • Active HIPS Rules
      • HIPS Rule Sets
      • HIPS Groups
        • Registry Groups
        • COM Groups
    • Protected Objects
      • Protected Objects - HIPS
        • Protected Files
        • Blocked Files
        • Protected Registry Keys
        • Protected COM Interfaces
      • Protected Objects - Containment
        • Protected Files And Folders
        • Protected Keys
    • Data Loss Prevention
      • DLP Monitoring Rules
      • DLP Discovery Rules
      • DLP Keyword Groups
    • Containment Settings
      • Containment Settings
      • Auto-Containment Rules
      • Virtual Desktop Settings
      • Containment - An Overview
      • Unknown Files - The Scanning Processes
    • File Rating Configuration
      • File Rating Settings
      • File Groups
      • Submitted Files
    • Advanced Protection
      • VirusScope Settings
      • Scan Exclusions
      • Device Control Settings
      • Script Analysis Settings
      • Miscellaneous Settings
    • Web Filter Settings
      • Website Filtering Rules
      • Website Categories
  • Appendix 1 - CCS How To... Tutorials
    • Enable / Disable AV, Firewall, Auto-Containment And VirusScope Easily
    • Set Up The Firewall For Maximum Security And Usability
    • Block Internet Access While Allowing Local Area Network (LAN) Access
    • Set Up HIPS For Maximum Security And Usability
    • Create Rules To Auto-Contain Applications
    • Run An Instant Antivirus Scan On Selected Items
    • Create An Antivirus Scan Schedule
    • Run Untrusted Programs Inside The Container
    • Run Browsers Inside The Container
    • Restore Incorrectly Quarantined Items
    • Submit Quarantined Items To Comodo Valkyrie For Analysis
    • Enable File Sharing Applications Like BitTorrent And Emule
    • Block Any Downloads Of A Specific File Type
    • Disable Auto-Containment On A Per-application Basis
    • Switch Off Automatic Antivirus Updates
    • Suppress CCS Alerts Temporarily
    • Control External Device Accessibility
  • Appendix 2 - Comodo Secure DNS Service
    • Router - Manually Enable Or Disable Comodo Secure DNS
    • Windows - Enable Comodo Secure DNS
  • About Comodo Security Solutions

Manage Quarantined Items


Click 'Tasks' > 'General Tasks' > 'View Quarantine'

  • The quarantine area shows malicious files which CCS has isolated to prevent them from infecting your system.
  • All files in quarantine are encrypted so they cannot run or cause harm.
  • Items are usually quarantined by the antivirus scanner, but it is also possible to manually quarantine items. See 'General Tasks' > 'Scan and Clean Your Computer' if you want to learn about the AV scanner.

Open the 'Quarantine' interface

  • Click 'Tasks' on the CCS home screen
  • Click 'General Tasks' > 'View Quarantine'




    • Item - The name of the malicious component
    • Location - The file path of the item
    • Date/Time – When the item was moved to quarantine.

    The interface lets you review quarantined files and take the following main actions:

    • Permanently delete the file
    • Restore the file to its original location
      • Submit the file to Comodo Valkyrie for analysis
      • Manually add files to quarantine

      Search and filter options:

      • Click any column header to sort items in alphabetical order of that column
      • Click the search icon in the 'Item' column to search for a file by name
      • Click the search icon in the 'Location' column to search by file-path
      • Click the icon in the 'Date/Time' column to filter results by time period




      Manually add files to quarantine


      Files or folders that you are suspicious of can be manually moved to quarantine:

      • Click 'Tasks' on the CCS home screen
      • Click 'General Tasks' > 'View Quarantine'

      • Click the 'Add' button at the top
      • Navigate to the file you want to add to the quarantine and click 'Open'.


       

      The file will be added to 'Quarantine'. You can even send the file for analysis to Comodo Valkyrie, for inclusion in the white list or black list, by clicking the 'Submit' button.


      Remove a quarantined item

      • Click 'Tasks' on the CCS home screen
      • Click 'General Tasks' > 'View Quarantine'
      • Select the items in the quarantine interface and click the 'Delete' button at the top
      • Click the 'Delete All' button if you want to permanently remove all quarantined items
      • The files will be deleted from your computer

      Restore a quarantined item

      • Click 'Tasks' on the CCS home screen
      • Click 'General Tasks' > 'View Quarantine'
      • Select the items to be moved back to their original locations and click the 'Restore' button at the top




      You will be asked if you want to add the item to the Scan Exclusions list:

      • 'Yes' - The file will be restored to its original location. It will not be flagged as dangerous nor quarantined by future antivirus scans
      • 'No' - The file will be restored to its original location. If the file contains malware it will be re-quarantined by the next antivirus scan

      Submit selected quarantined items to Valkyrie for analysis


      Valkyrie is Comodo’s file testing and verdicting system. After submitting your files, Valkyrie will analyze them with a range of static and dynamic tests to determine the file’s trust rating.

      • Click 'Tasks' on the CCS home screen
      • Click 'General Tasks' > 'View Quarantine'
      • Select the items you want to submit. You can send several files at once
      • Click 'Submit' > 'Submit to Valkyrie' in the top-menu. The files will be immediately sent to Valkyrie for analysis

      Tip: Alternatively, right click an item then choose 'Submit to Valkyrie' from the menu.

      • All submitted files are analyzed at Valkyrie. If they are found to be trustworthy, they will be added to the Comodo safe list (white-listed). Conversely, if they are found to be malicious then they will be added to the database of virus signatures (blacklisted).
      Our Products
      • Free Antivirus
      • Free Internet Security
      • Website Malware Removal
      • Free Anti-Malware
      • Anti-Spam (Free Trial)
      • Windows Antivirus
      • Antivirus for Windows 7
      • Antivirus for Windows 8
      • Antivirus for Windows 10
      • Antivirus for MAC
      • Antivirus for Linux
      • Free Endpoint Security
      • Free ModSecurity
      • Free RMM
      • Free Website Malware Scanner
      • Free Device Manager for Android
      • Free Demo
      • Network Security
      • Endpoint Protection
      • Antivirus for Android
      • Comodo Antivirus
      • Wordpress Security
      Cheap CDN
      • Bootstrap CDN
      • Semantic UI CDN
      • Jquery CDN
      • CDN Plans
      • CDN
      • Free CDN
      Enterprise
      • Patch Management Software
      • Patch Manager
      • Service Desk
      • Website Down
      • Endpoint Protection Solutions
      • Website Security Check
      • Remote Monitoring and Management
      • Website Security
      • Device Manager
      • ITSM
      • CRM
      • MSP
      • Android Device Manager
      • MDR Services
      • Managed IT Support Services
      • Free EDR
      Free SSL Certificate
      Support Partners Terms and Conditions Privacy Policy

      © Comodo Group, Inc. 2025. All rights reserved.