Malware Handling and Correction

The following steps are for experienced BigFix administrators who just need a list for tasks involving malware handling and correction.

Exempting Files from Detection

Procedure

  1. Click Endpoint Protection > Core Protection Module > Configuration > Spyware Approved List.
  2. Identify one or more files that you want to prevent from being detected as spyware.
  3. Click Create Spyware Approved List Configuration Task.
  4. Deploy the settings by clicking Endpoint Protection > Core Protection Module > Configuration > Spyware Approved List > <task name>.

Recovering “Spyware” Files

Procedure

  1. In the console, click Endpoint Protection > Core Protection Module > Common Tasks > Core Protection Module.
  2. Click Restore Spyware/Grayware. The Spyware/Grayware Restore Wizard appears.

Using the Anti-Threat Toolkit (ATTK)

Procedure

  • To deploy ATTK to clients, click Endpoint Protection > Core Protection Module > Common Tasks > Core Protection Module > Core Protection Module - Execute Anti-Threat Toolkit (ATTK).
  • To upload ATTK logs to the server, click Endpoint Protection > Core Protection Module > Common Tasks > Core Protection Module > Core Protection Module - Upload Anti-Threat Toolkit (ATTK) Logs.