Comodo Help
Find the desired product help
Xcitium Unknown File Hunter

Xcitium Unknown File Hunter

Version 5.0

English

Print Help Download Help
Introduction To Comodo Unknown File Hunter
  • Introduction To Comodo Unknown File Hunter
  • Run Unknown File Hunter
    • The Main Interface
    • Login To UFH
  • Scan Computers
    • Scan Computers Using Active Directory
    • Scan Computers By Workgroup
    • Scan Computers By Network Addresses
    • Scan Local Computer
  • Scan Results
    • Comodo Unknown File Hunter Scan Results
    • Valkyrie Analysis Results
  • Reports
    • Executive Report
    • Device Report
    • Program Report
  • About Comodo Unknown File Hunter
  • Agent Requirements
  • About Comodo Security Solutions

Introduction to Comodo Unknown File Hunter


Comodo Unknown File Hunter (UFH) is a lightweight scanner which identifies unknown, and potentially malicious files, on your network. After scanning your systems, it will classify all audited files as 'Safe', 'Malicious' or 'Unknown'.


While ‘Safe’ files are ok to run, and ‘Malicious’ files are dangers you should remove, it is in the 'Unknown' category where most zero-day threats are found. Traditional antivirus systems allow unknown files to run simply because they haven’t yet been ‘proven bad’.


Antivirus companies need to first observe the malware in action before they can classify it as malicious. Until this happens, the malware will have a rating of ‘unknown’ and is free to run undetected. ‘Innocent until proven guilty’ might be the defining characteristic of a healthy criminal justice system, but it certainly won’t keep your network secure.


UFH allows you to upload unknown files to our Valkyrie servers where they will undergo a battery of tests to discover whether or not they are harmful. You can view the results of these tests in the UFH interface.




Features

    • No installation required. You can run UFH direct from a USB stick
    • Capable of scanning computers from Active Directory, Workgroup and by Network Address
    • Unknown files can be automatically uploaded to Comodo Valkyrie and tested for malicious behavior
    • Detailed reports provide invaluable insights into the trust level of files on your network

      This guide is intended to take you through the use of Comodo UFH and is broken down into the following main sections.

      • Introduction
          • Run Unknown File Hunter
            • Scan Computers
            • Scan Computers using Active Directory
            • Scan Computers by Workgroup
            • Scan Computers by Network Addressees
            • Scan Local Computer
              • Scan Results
              • Comodo Unknown File Hunter Scan Results
              • Valkyrie Analysis Results
              • Reports
              • Executive Report
              • Device Report
              • Program Report
              • About Comodo Unknown File Hunter
              • Agent Requirements

              Our Products
              • Free Antivirus
              • Free Internet Security
              • Website Malware Removal
              • Free Anti-Malware
              • Anti-Spam (Free Trial)
              • Windows Antivirus
              • Antivirus for Windows 7
              • Antivirus for Windows 8
              • Antivirus for Windows 10
              • Antivirus for MAC
              • Antivirus for Linux
              • Free Endpoint Security
              • Free ModSecurity
              • Free RMM
              • Free Website Malware Scanner
              • Free Device Manager for Android
              • Free Demo
              • Network Security
              • Endpoint Protection
              • Antivirus for Android
              • Comodo Antivirus
              • Wordpress Security
              Cheap CDN
              • Bootstrap CDN
              • Semantic UI CDN
              • Jquery CDN
              • CDN Plans
              • CDN
              • Free CDN
              Enterprise
              • Patch Management Software
              • Patch Manager
              • Service Desk
              • Website Down
              • Endpoint Protection Solutions
              • Website Security Check
              • Remote Monitoring and Management
              • Website Security
              • Device Manager
              • ITSM
              • CRM
              • MSP
              • Android Device Manager
              • MDR Services
              • EDR Services
              • Ransomware Prevention
              • Managed IT Support Services
              • EDR
              Free SSL Certificate
              Support Partners Terms and Conditions Privacy Policy

              © Comodo Group, Inc. 2023. All rights reserved.