A suspicious file is a file that exhibits a combination of characteristics that are commonly, but not exclusively, found in viruses.
For information about the Home page, see About the Home page.
Information about each item is shown in the columns.
Name displays the identity that Sophos Anti-Virus has detected. To learn more about the suspicious file, click the identity, and Sophos Anti-Virus connects you to the analysis of the suspicious file on the Sophos website.
Details displays the name and location of the item. If the item is associated with a rootkit, it is displayed as “Hidden”.
Available actions displays actions that you can perform on the item. Unless the item is hidden, there are three actions: Authorize, Delete and Move, described below. If you click one of the actions, the action is performed on the item, following confirmation. Hidden files can only be authorized.
To deal with the suspicious files, use the buttons described below.
Select all/Deselect all
Click these buttons to select or deselect all the items. This enables you to perform the same action on a group of items. To select or deselect a particular item, select the check box to the left of the item type.
Clear from list
Click this to remove selected items from the list, if you trust them. This does not delete the items from disk, however.
Perform action
Click this to display a list of actions that you can perform on the selected items.
To configure what actions you can perform, refer to Configure user rights for Quarantine manager.
To see the list of authorized suspicious files, click Configure authorization.