Quarantine - what it is, why it helps, and safe restore/remove practices

Quarantine

What it is

Quarantine is a security tool’s safe-hold for suspicious items. Instead of deleting a file outright, the product moves it to a locked location, renames or packages it so it can’t run, and blocks any linked startup hooks. This preserves evidence for review, cuts off execution, and lets you decide to restore (rare), submit for analysis, or remove permanently. It’s different from a sandbox (execution in isolation) and from a recycle bin (simple deletion without containment).

Why it matters

Immediate isolation stops further damage and reduces false-positive risk by giving you a safe review window. It also keeps artifacts for forensics, compliance, and support.

How it works 

  • Detection → isolation: File is moved to a restricted folder and rendered non-executable.

  • Metadata saved: Original path, hash, detection name, and time are recorded.

  • Persistence disabled: Related autoruns (Run keys, tasks, services) are blocked or queued for cleanup.

  • Operator choice: Keep for analysis, restore to a test VM, or permanently delete after retention.

What to do

  1. Review details: original path, detection name, time, and user.

  2. If the file is business-critical, submit it to your vendor or test in a VM before deciding.

  3. Do not restore unless you’re confident it’s clean; prefer replacing from a known-good source.

  4. After backups are verified, delete quarantined items to reduce clutter.

  5. If credentials or tokens may have been exposed, rotate them even if the file is quarantined.

Watch-outs

  • Restoring can re-enable startup entries or scheduled tasks tied to the file. Recheck autoruns after any restore.

  • Some threats drop multiple copies; quarantine may catch one while others remain. Run a full scan.

  • Quarantine doesn’t undo data theft. If exfiltration is possible, perform account checks and password resets.

  • External drives can reintroduce threats. Scan removable media before reconnecting.

    Glossary (A–Z)

    All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
      • Related Articles

      • Memory Forensics

        What it is Memory forensics is the practice of analyzing a computer’s RAM to see what is happening right now or just happened. By capturing and examining memory, investigators can spot active processes, network connections, passwords in use, and ...
      • EDR (Endpoint Detection and Response)

        What it is EDR is your always-on security team for laptops and servers. It watches what’s happening on each device, spots attacks in progress, and helps you respond fast - quarantine, investigate, and clean up. For details on capabilities and use ...
      • NDR (Network Detection And Response)

        What it is Network Detection and Response (NDR) watches live network traffic to spot and investigate suspicious behavior in real time. Instead of relying on signatures, it analyzes patterns and anomalies to catch threats moving across your ...
      • XMRig Malware

        What it is XMRig malware is a cryptominer that sneaks onto your PC and secretly mines the Monero (XMR) cryptocurrency using your CPU/GPU. You’ll notice slower performance, hot fans, and higher power bills while attackers collect the coins. It often ...
      • Remcos (Remcos RAT)

        What it is Remcos is a Windows remote access tool (RAT) sold by Breaking Security that’s widely abused by threat actors. Once on a system, it gives remote control: keylogging, screen capture, file exfiltration, command execution, and persistence. ...