How do I detect PUP/PUA as infected?

This article applies to all MetaDefender Core releases deployed on Windows and Linux systems with the latest engine updates.

Description:

PUP stands for Potentially Unwanted Program

PUA stands for Potentially Unwanted Application

Software that isn't malicious by definition but could be, it is often:

  • Installed without clear user consent
  • Bundled with other software
  • Performs unwanted behavior (e.g., showing ads, tracking activity, slowing performance)

Common Examples:

  • Toolbars or browser hijackers (e.g., search engine changers)
  • Adware (injects ads or pop-ups)
  • System optimizers or registry cleaners (that fake "problems" to upsell)
  • Fake antivirus or driver updaters
  • Software that installs background processes without notice

How do I mark these detections as infected?

By default, PUP/PUA are labeled in their own category. MetaDefender Core separates unwanted detections into three categories: Suspicious, Infected, and PUP/PUA.

To place PUP/PUA into the infected category, please check the box below on the engine [not available for all engines].

Example:

Use case:

If you have a threshold built into the workflow to only mark a file as “Infected” if x or more engines find a malware signature, PUP/PUA will now be included in this detection threshold.

If Further Assistance is required, please proceed to log a support case or chatting with our support engineer.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard