The Main Interface
The main interface lets you configure and run scans, view results and generate risk reports.
Main Functional Areas
- Menu Bar – Shows the current status of the scan and contains the following buttons:
- Previous Scans / Current Scan - View results of past scans / current scan.
- Create Report - View reports generated by the UFH tool. See 'Reports' for more details.
- Options – Shows the port numbers that UFH uses to communicate with our file lookup service (FLS).
The FLS is used to deliver real-time verdicts on the trust status of unknown files. Admins should leave these ports at the default.

- Help – Contains 'About' and 'Agent Requirements'
'About' - shows product and version information.'Agent Requirements' - Troubleshooting advice if you experience problems connecting to your target computer.
- Login – You can use the tool as a guest or login as a registered user. See 'Login to UFH' for more information.
- Controls – On the left, UFH shows messages such as the number of devices found, number of malicious files detected and so on. Also contains control buttons for:
- Scan Now / New Custom Scan / Stop Scan - Scan target computers to identify unknown files. You can add computers via Active Directory, Workgroup or Network Addresses.
- Scan Now – Shown when you first open the application.
- New Custom Scan – Shown after you have run the first scan for the session.
- Stop Scan – Cancel a scanning process.
- See 'Scan Computers' for more details.
- Custom Scan / Detailed Scan Results
- Custom Scan – Configure your scan. You can scan by Active Directory, network address, workgroup and local computer. See 'Scan Computers' for more information.
- Detailed Scan Results – Shown after a scan is completed. Click this button to view full results of the scan at https://valkyrie.comodo.com. See 'Valkyrie Analysis Results' for more information.
- Start Discovery / Skip Discovery / Restart Discovery – Start/stop discovery of devices on your network.
- Main Display Area - Details of discovered endpoints, scanned endpoints and scan results. See 'Scan Computers' and 'Scan Results' for more details.
- Search - Look for discovered endpoints by name or IP.
- Notifications - Information about unknown and malicious files detected after a scan finishes. Click the 'Edit Email' button to change the recipient list for Valkyrie analysis results.
