Remove Potential Threats

After the scan report has been generated, MetaDefender Drive's operators can sort and remove the data identified as potential threats from the target device.

Use the filters to sort the files based on the type of the potential threat:

  • Potentially Infected Files
  • Potential Vulnerability
  • Sensitive Data
  • Country of Origin

Please exercise caution with the file removal step, as there is no way to recover your deleted data. If you are uncertain about the next step, please shut down your system, back up your data, perform the scan again, and then perform the file removal.

  1. Select the files you have decided to remove, and click Remove Files. Then, read the Warning and confirm that you understand the risks that come with removing the identified threats from your system, and click Proceed:
FIle removal risk confirmation prompt

FIle removal risk confirmation prompt

  1. Your disks will be mounted as WRITABLE to prepare for file removal. You can track the file removal progress displayed on the status bar at the bottom of the screen:
File removal in progress

File removal in progress

  1. When the file removal is complete, the system disks will be re-mounted as READ-ONLY again:
Infected file removal  confirmation

Infected file removal confirmation

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard