To prevent a threat distribution on an infected device, you can run a malware scan in one of the following ways:
This option is available if the investigation graph is built.
You can also configure the response action to run automatically when creating or editing a playbook.
To perform the Malware scan response action, you must have one of the following XDR roles: Main administrator, Tenant administrator, Junior analyst, Tier 1 analyst, Tier 2 analyst.
It might take up to 15 minutes to launch a response action due to the synchronization interval between the managed device and the Administration Server.
To scan a device for malware:
If you want to run a malware scan from an investigation graph, select the Incidents section.
You can select several devices, if necessary.
The Virus scan window opens on the right side of the screen.
You can switch the Network drives toggle button to include network devices into the scan. By default, this option is disabled.
A full scan can slow down the device due to an increased load on its operation system.
The kernel memory, running processes, and disk boot sectors are scanned if you select this type.
In the Specify a path to the file field, specify a path to the file that you want to scan. If you want to set several paths, click the Add path button, and then specify the path.
The selected type of malware scan starts. If the operation is completed successfully, an appropriate message is displayed on the screen, and the alert or incident is displayed in the alert table or incident table with the Success action status. Otherwise, an error message is displayed, and the alert or incident is displayed with the Error action status.
After the malware scan operation is finished, you can view the result.
Page top