Overview Release Notes Central Hub Deployment Kubernetes Configuration Advanced Deployment
Getting Started
Deployment & Usage
Support
References
Knowledge Base
v5.10.0
Search this version
Knowledge Base
Knowledge Base
Configuration and Settings
Errors and Troubleshooting
Features and Functionality
Licensing, Setup and Deployment
Updates, Patches and Bug Fixes
Title
Message
Create new category
What is the title of your new category?
Edit page index title
What is the title of the page index?
Edit category
What is the new title of your category?
Edit link
What is the new title and URL of your link?
Is Metadefender Core compromised while scanning files?
Copy Markdown
Open in ChatGPT
Open in Claude
If MetaDefender Core does not support a sandbox scanning model (sandbox or a container that runs in a quarantine mode), it means that, while scanning threats, the files will be extracted to disk, and infected files can compromise the Core-System. Is it correct?
Answer: Writing a malicious file to the disk does not mean it can do any harm. To activate malware, files should be interpreted. We do not interpret or run them, we only use them as bitstreams, so Metadefender Core should not be compromised.
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
Last updated on
Was this page helpful?
Next to read:
What is the Queue Mechanism on Metadefender Core?Discard Changes
Do you want to discard your current changes and overwrite with the template?
Archive Synced Block
Message
Create new Template
What is this template's title?
Delete Template
Message
