Malware Scan
(Updated: )Malware Scan is a tool designed to perform regular scans on Mac computers enrolled in your Organization to detect and notify users about various types of threats. It gives users the means to remove any detected malicious software instantly from their systems.
Powered by Moonlock Engine, Malware Scan helps identify and clean up common threats, including viruses, miners, keyloggers, worms, Trojans, and other types of malicious software.
When set up in the Admin Dashboard as an automation task, Malware Scan runs regularly on all Mac computers enrolled in your Organization, according to the configured frequency and scan mode.
If needed, users can manually start the scheduled Malware Scan task in the desktop app before its set time.
Malware types
Malware Scan helps you detect and clean up the following types of malware:
Adware: Displays unwanted ads, often tricking users into buying products or services.
Backdoor: Allows unauthorized access to a user's Mac.
Botnet: Turns a Mac into part of a bot network controlled by external commands.
Dropper: Installs additional malware, typically disguised as legitimate software.
Exploit: Takes advantage of system vulnerabilities to gain unauthorized access, often used to steal data or cause harm.
Installer: Installs other software, sometimes for malicious purposes.
Keylogger: Collects keystrokes, potentially stealing passwords, credit card numbers, and sensitive information.
Miner: Uses the system's processing power to mine cryptocurrency without the user's knowledge, slowing down their Mac.
PUA: Potentially unwanted applications, often exhibiting unwanted behavior even if installed intentionally.
Ransomware: Blocks access to user data or system until a ransom is paid.
Riskware: Legitimate software that could be exploited for malicious purposes.
Rootkit: Grants unauthorized users administrative access to the system.
Spyware: Collects data from the system without the user's knowledge and sends it to unknown entities.
Stealer: Steals sensitive data, such as login credentials or financial information, without the user's consent.
Trojan: Disguises itself as legitimate software to gain unauthorized access or control of the system.
Virus: Infects other programs, replicating itself and modifying functionality.
Worm: Spreads across networks, replicating itself and infecting other systems.
Other: Undefined malicious software that should still be removed for security reasons.
Scan modes
When configuring the Malware Scan automation task in the Admin Dashboard, you can choose from the following scan modes:
Balanced Scan: Offers a blend of speed and thoroughness. The scan covers a wide range of files and system areas, providing a balanced approach to security checkups.
Deep Scan: Conducts an exhaustive examination of your entire system, diving into every file and folder. Best used when maximum security assurance is needed or when malware activity is suspected.
Quick Scan: Scans the most vulnerable areas of your system for immediate threats. Ideal for regular checkups or when you're short on time.