Quarantine Management

Safely isolate, review, and manage suspicious files in quarantine.

Quarantine Management

The quarantine system provides a safe way to isolate suspicious files without permanently deleting them.

How Quarantine Works

When you quarantine a file:

  1. The file is moved from its original location to a protected quarantine directory
  2. The file is renamed with a random hash to prevent direct execution
  3. An .htaccess rule denies all web access to the quarantine directory
  4. The original file path, timestamp, and detection details are recorded

The file is completely isolated from your store — it can't be accessed by visitors or executed by the web server.

Quarantine Actions

View — Read the file's content directly in the module interface. Useful for analyzing suspected malware.

Edit — Modify the file's content before restoring. Use this to clean malicious code from an otherwise legitimate file.

Restore — Move the file back to its original location. Use when you determine a quarantined file is safe (false positive).

Delete — Permanently remove the file from the quarantine. Use for confirmed malware you no longer need to review.

Audit Trail

Every quarantine action is logged:

  • When the file was quarantined
  • Who quarantined it (which admin user)
  • If/when it was restored or deleted
  • Original detection category and severity

Best Practices

  1. Quarantine first, investigate later — When in doubt, quarantine. You can always restore.
  2. Review quarantined files regularly — Don't let quarantine become a permanent storage. Review and either restore or delete.
  3. Use the editor for cleanup — If a legitimate file contains injected code, edit out the malicious portion before restoring.
  4. Check your store after quarantine — Some quarantined files might be needed by your store. If something breaks, check the quarantine for recently isolated files.