Recommended Actions for a Malware Detection Alert from Securepoint Antivirus Pro
New article: 11.2025
This article refers to a Beta version
-
Preliminary Remarks
To avoid possible infection, various measures should already be taken in advance:
- Install Securepoint AV Pro on all Windows devices
- For devices in a Securepoint UTM network: Configure HTTP Proxy and
Webfilter/Content Filter
- If no Securepoint UTM is present in the network: Set up Cloud Shield
- Create awareness and understanding of threats through Awareness Trainings
- Filter emails using UTM Mailsecurity or
from the cloud so that malware is filtered out in advance and does not reach employees' inboxes
- Secure mobile devices with Mobile Security and/or Mobile Device Management
- Secure important data with Securepoint Unified Backup
Recommended Actions

If our AV reports a malware infection, it has detected and quarantined at least one malicious file.
In most cases, the malware infection is blocked by this, however, we cannot guarantee this.
Specific Steps:
- The affected system and its network environment(s) should be monitored more closely after a malware detection and, if necessary, subjected to further analysis. Logs can be helpful here, e.g., Logs.
- In the case of a malware infection, the user of the system has usually done something dangerous.
Similar actions should be prevented in the future through restrictions and employee training. - Analysis of the Infection Path
- In the AV client and in the AV portal , the location of the detected file can be viewed.
Often, an infection path can be interpreted based on the location. - If the file is located, for example, in the Downloads directory, it is likely that it was actively downloaded and saved by the user via the browser or another program. Discussing with the user can often help narrow down the infection path.
- In the AV client and in the AV portal , the location of the detected file can be viewed.
- Check if, for example, HTTP Proxy with Virus Scanner,
Webfilter, Cloud Shield, Mobile Security, and Mobile Device Management are correctly set up


