InformationPotentially Unwanted Programs (PUPs) include Spyware, Adware, Remote Administration Tools, Dialers, Password Crackers, Jokes, and Key Loggers. While PUPs do not typically have any infection capability on their own, they rely on malware or other attach mechanisms to be installed onto target hosts, after which they will collect and transfer data from the host to an external host and/or will be used as attach mechanisms. Configuring the anti-virus software to attempt to clean the file first will allow for the possibility of a false positive. In most cases, however, the secondary action of quarantine will be used, mitigating the risk of the PUPs being installed and used maliciously.
SolutionFrom the ePO server console System Tree, select 'My Organization'. Select the 'Systems' tab. To show all systems in the System Tree, select 'This Group and All Subgroups' from the 'Preset:' drop-down list.
From the list of systems, locate the asset representing the Linux system being reviewed. Click on the system to open the System Information page.
Click on Actions >> Agent >> Modify Tasks on a Single System.
From the list of available tasks in the 'Task Name' column, with the assistance of the ePO SA, identify the weekly On Demand scan client task.
For the designated weekly On Demand scan client task, verify the 'Task Type' is listed as 'On Demand Scan'.
Under the 'Task Name' column, click on the link for the designated task to review the task properties.
In the 'Actions' tab, for 'When Programs & Jokes are found: If the above action fails:', select the radio button for 'Move infected files to the quarantine directory' is selected.
Populate the 'Quarantine Directory:' field with '/quarantine' (or another valid location as determined by the organization).