Remove Potential Threats
After the scan report has been generated, MetaDefender Drive's operators can sort and remove the data identified as potential threats from the target device.
Use the filters to sort the files based on the type of the potential threat:
- Potentially Infected Files
- Potential Vulnerability
- Sensitive Data
- Country of Origin
Please exercise caution with the file removal step, as there is no way to recover your deleted data. If you are uncertain about the next step, please shut down your system, back up your data, perform the scan again, and then perform the file removal.
- Select the files you have decided to remove, and click Remove Files. Then, read the Warning and confirm that you understand the risks that come with removing the identified threats from your system, and click Proceed:

FIle removal risk confirmation prompt
- Your disks will be mounted as WRITABLE to prepare for file removal. You can track the file removal progress displayed on the status bar at the bottom of the screen:

File removal in progress
- When the file removal is complete, the system disks will be re-mounted as READ-ONLY again:

Infected file removal confirmation
Was this page helpful?