Views:
An identified file is a file that has been found to be or to contain malware and has therefore been encrypted and moved to a special folder on the protected computer. Whether or not an infected file can be viewed and restored depends on the anti-malware configuration and the operating system on which the file was found:
Topics on this page:
For information about events that are generated when malware is encountered, see Anti-malware events.

See a list of identified files

The Events and Reports page provides a list of identified files. From there you can see the details for any of those files:
  1. Click Events and Reports > Events > Anti-Malware Events > Identified Files.
  2. To see the details of a file, select the file and click View.
The list of identified files includes the following columns of information:
  • Infected File: Shows the name of the infected file and the specific security risk.
  • Malware: Names the malware infection.
  • Computer: Indicates the name of the computer with the suspected infection.
  • File Status: Indicates whether or not a file is ready for download.
The Details window provides the following information:
  • Detection Time: The date and time on the infected computer that the infection was detected.
  • Infected File(s): The name of the infected file.
  • File SHA-1: The SHA-1 hash of the file.
  • Malware: The name of the malware that was found.
  • Scan Type: Indicates whether the malware was detected by a Real-time, Scheduled, or Manual scan.
  • Action Taken: The result of the action taken by Deep Security when the malware was detected.
  • Computer: The computer on which this file was found. (If the computer has been removed, this entry will read "Unknown Computer".)
  • Container Name: Name of the Docker container where the malware was found.
  • Container ID: ID of the Docker container where the malware was found.
  • Container Image Name: Image name of the Docker container where the malware was found.

Working with identified files

The Identified Files page allows you to manage tasks related to identified files. Using the menu bar or the context menu, you can do the following:
  • anti_malware_restore_quarantine_file=5da35082-12a8-43fb-b6aa-bbdaa6aef7e2.pngRestore identified files back to their original location and condition. Note that you cannot perform this action if your host uses the Agent/Appliance Initiated communication.
  • anti_malware_quarantine_file_download=d76e8416-5ec1-4225-8e3b-7ae03081da16.pngDownload identified files from the computer or Virtual Appliance to a location of your choice. To download files:
    1. Select the files you want to download.
    2. Go to Download > Request download. The File Status column indicates that the download is pending.
    3. Once the file is ready for download, the File Status column changes to Ready for download and the system event Identified file is ready for download appears.
    4. Select the identified files that are ready to be downloaded.
    5. Go to Download > Download.
    Once a file is ready for download, you have 24 hours to download the file to your location of choice.
  • icon_analyze=57102d39-4019-4c25-bcbf-81afb542d74d.pngAnalyze identified files from the computer or Virtual Appliance.
  • delete=796a026e-ec5f-4639-aaea-9b2619ab6e01.pngDelete one or more identified files from the computer or Virtual Appliance. Note that you cannot perform this action if your host uses the Agent/Appliance Initiated communication.
  • export=5a159aca-a365-4283-bf91-5ad8852a70b3.pngExport information about the identified files (not the file itself) to a CSV file.
  • details=98b6c5e2-568a-4075-aae1-00f5d6b92811.pngView the details of an identified file.
  • details=98b6c5e2-568a-4075-aae1-00f5d6b92811.pngComputer Details displays the screen of the computer on which the malware was detected.
  • details=98b6c5e2-568a-4075-aae1-00f5d6b92811.pngView Anti-Malware Event displays the anti-malware event associated with this identified file.
  • columns=b85fa02e-697e-4061-873b-5378ec1e3576.pngAdd or Remove Columns by clicking Add/Remove.
  • search=a7128c70-c684-4f9e-a807-f7ce2c6b491a.pngSearch for a particular identified file.
Identified files are automatically deleted from a Deep Security Virtual Appliance when the following occurs:
  • A VM is moved to another ESXi host by vMotion. Identified files associated with that VM are deleted from the virtual appliance.
  • A VM is deactivated from the Deep Security Manager. Identified files associated with that VM are deleted from the virtual appliance.
  • Deep Security Virtual Appliance is deactivated from the Deep Security Manager. All the identified files stored on that virtual appliance are deleted.
  • Deep Security Virtual Appliance is deleted from the vCenter. All identified files stored on that virtual appliance are deleted.

Restore identified files

Create a scan exclusion for the file

Before you can restore a file to its original location, you have to create a scan exclusion so that Deep Security doesn't immediately re-identify the file when it reappears on the computer.
Note
Note
The following instructions describe how to create an exclusion for the file on an individual computer but you can make the same configuration changes at the policy level.
  1. Open the Computers page and go to Anti-Malware > Identified Files and double click the identified file to view its properties.
  2. Note the file's exact name and original location.
  3. Still in the Computers page, go to Anti-Malware > General and click the Edit button next to each Malware Scan that's in effect to open the Malware Scan Configuration properties window. 2016-07-07_000116_DS10=24499f89-7334-41a6-9a41-30b102e3ece0.png
  4. In the Malware Scan Configuration properties window, click on the Exclusions tab.
  5. In the Scan Exclusions area, select File List and then either press edit if a file list is already selected, or select New from the menu to create a new File List.
  6. In the File List properties window, enter the file path and name of the file to be restored. Click OK to close the File List properties window.2016-07-08_000124_DS10=bad93654-bf61-4de1-8b58-e09d472e9bd2.png
  7. Close the Malware Scan Configuration properties window by clicking OK.
  8. When you've edited all the Malware Scan Configurations, click Save in the Computers page to save your changes. You're now ready to restore your file.

Restore the file

  1. Still in the Computers page, go to the Anti-Malware > Identified Files tab.
  2. Right-click the identified file and select Actions > Restore and follow the steps in the wizard.
Your file is restored to its original location.

Manually restore identified files

To manually restore an identified file, download the file to your computer. The Identified File wizard will display a link to an Administration Utility which you can use to decrypt, examine, or restore the file. Use the quarantined file decryption utility to decrypt the file and then move it back to its original location.
The decryption utility is in a zip file, QFAdminUtil_win32.zip, located in the "util" folder under the Deep Security Manager root directory. The zipped file contains two utilities which perform the same function: QDecrypt.exe and QDecrypt.com. Running QDecrypt.exe invokes an open file dialog that lets you select the file for decryption. QDecrypt.com is a command-line utility with the following options:
  • /h, --help: show this help message
  • --verbose: generate verbose log messages
  • /i, --in=<str>: quarantined file to be decrypted, where <str> is the name of the quarantined file
  • /o, --out=<str>: decrypted file output, where <str> is the name given to the resulting decrypted file
Note
Note
This utility is supported on Windows 32-bit systems and Windows 64-bit systems.