Comodo Help
Find the desired product help
Xcitium Unknown File Hunter

Xcitium Unknown File Hunter

Quick Start Guide

English

Print Help Download Help
How To Use Comodo Unknown File Hunter (UFH)
  • How To Use Comodo Unknown File Hunter (UFH)

How to Use Comodo Unknown File Hunter (UFH)

 

Comodo UFH lets you scan your entire network to discover the trust levels of all files on your endpoints. The tool classifies files as 'safe' (whitelisted / no threat), 'malicious' (blacklisted / malware) or 'unknown' (neither blacklisted nor whitelisted). Unknown files are automatically submitted to Comodo Valkyrie for static and dynamic analysis. The results of the Valkyrie tests are reported back to UFH for your review.


This tutorial briefly explains how to set up and run a scan.


Step 1 - Download, install and run the tool


Comodo Unknown File Hunter can be downloaded from:

  • Comodo Dragon (CD) / Comodo One
  • Comodo Valkyrie website

Comodo Dragon / Comodo One management console


Unknown File Hunter is available for download from your Dragon / Comodo One account:

  • Login to your Comodo Dragon / Comodo One account at https://platform.comodo.com/app/login / https://one.comodo.com/app/login
  • Click 'Tools' > Click 'Download' in the Unknown File Hunter tile
  • You can sign up for a free Comodo Dragon / Comodo One account at https://platform.comodo.com/signup / https://one.comodo.com/signup/. Creating a Dragon / Comodo One account also creates a Valkyrie account for you.
  • You can login to UFH and Valkyrie with your Dragon / Comodo One credentials

Comodo Valkyrie Website

  • Go to https://valkyrie.comodo.com/
  • Click 'Download Unknown File Hunter'
  • You can create a Valkyrie account at https://valkyrie.comodo.com
  • Please visit https://valkyrie.comodo.com/apt_tool/download/UnknownFileHunter.exe


Run Unknown File Hunter

  • Launch the tool by double-clicking on the application icon:
  • C:/Program Files (x86)/Comodo/UnknownFileHunter. Click the folder icon to change the path and click 'OK'



  • You will need to agree to the EULA when you first run UFH on a new computer.
  • Click the 'License agreement' link, read the agreement and click 'I Accept'.


Step 2 – Specify targets and run a scan


The are four ways to scan endpoints:

  • Active Directory - Import computers from an active directory domain.
  • Workgroup - Add computers that belong to a particular workgroup.
  • Network Address - Specify individual host names, IP addresses or IP ranges.
  • This Computer – Scan the local device.

    If you need more help to specify targets, refer to our online guide at https://help.comodo.com/topic-400-1-794-10428-Scanning-Computers.html. Click 'Start Scanning' to begin the scan.


    Step 3 – Submit unknown files to Valkyrie (optional) and view results

     

    Detailed results are shown at the end of every scan.



    • Click '+' beside a hostname to view all files analyzed on the endpoint. Double-click any file to view scan details on the file
    • The tiles above the table show the total number of unknown, malicious and clean files on all endpoints covered by the scan 
    • 'Unknown' means no trust rating is available for the file 
    • Unknown files are uploaded to Valkyrie, Comodo's file analysis service, where they will be tested to find out whether or not they are malicious 
    • After analysis, they will be re-categorized as either 'Safe' or 'Malicious' 
    • Click 'Detailed Scan Results' to login to Valkyrie and view a breakdown of the tests on your files 
    • Login at https://valkyrie.comodo.com/with your Comodo Dragon, Comodo One or Valkyrie username and password.

    See 'Scan Results' if you need more help with this.

    • You also can view detailed scan results in the 'Reports' section:


    • Executive / Executive Valkyrie Report - Top level summary of scan results 
    • Per Device / Per Device Valkyrie Report – Results grouped by device
    • Per Program / Per Program Valkyrie Report – Results grouped by filename

    For more details about reports, see https://help.comodo.com/topic-400-1-794-10430-Reports.html.

    Our Products
    • Free Antivirus
    • Free Internet Security
    • Website Malware Removal
    • Free Anti-Malware
    • Anti-Spam (Free Trial)
    • Windows Antivirus
    • Antivirus for Windows 7
    • Antivirus for Windows 8
    • Antivirus for Windows 10
    • Antivirus for MAC
    • Antivirus for Linux
    • Free Endpoint Security
    • Free ModSecurity
    • Free RMM
    • Free Website Malware Scanner
    • Free Device Manager for Android
    • Free Demo
    • Network Security
    • Endpoint Protection
    • Antivirus for Android
    • Comodo Antivirus
    • Wordpress Security
    Cheap CDN
    • Bootstrap CDN
    • Semantic UI CDN
    • Jquery CDN
    • CDN Plans
    • CDN
    • Free CDN
    Enterprise
    • Patch Management Software
    • Patch Manager
    • Service Desk
    • Website Down
    • Endpoint Protection Solutions
    • Website Security Check
    • Remote Monitoring and Management
    • Website Security
    • Device Manager
    • ITSM
    • CRM
    • MSP
    • Android Device Manager
    • MDR Services
    • EDR Services
    • Ransomware Prevention
    • Managed IT Support Services
    • EDR
    • What is EDR
    Free SSL Certificate
    Support Partners Terms and Conditions Privacy Policy

    © Comodo Group, Inc. 2023. All rights reserved.