Skip to main content

Remove - Malware

Updated over 3 months ago

This guide will walk you through the process of deleting or quarantining malicious files found within your cloud environment.


STEP ONE:

Sign into your Cloud Access Monitor instance.


STEP TWO:

Navigate to the Audit & Control page, and select the Name of your desired Cloud Environment. (Global Views will show all accounts in your domain, while filtered views will show only users for that view)

mceclip0.png

STEP THREE:

Navigate to the Malware Tab across the top of the screen.

mceclip0.png

STEP FOUR:

All malicious files will be displayed in the results box in the bottom half of the screen.


STEP FIVE:

To take action select the Checkbox to the left of the file names you wish to remove, and select an Action above the results box.

mceclip1.png
  • Quarantine: Will place the malicious file into a safe space away from the rest of the environment. A folder in the administrative accounts G-Drive named CAM_Quarantine.

  • Delete: Will permanently delete the file containing malware.

Did this answer your question?