File classification Skip Navigation

File classification

The following table lists the possible file status entries that could display for each
CylancePROTECT Desktop
File Status
File Unavailable
Due to an upload constraint  (for example, the file is too large), the file is not available for analysis. Contact
Support for an alternate method to transfer the file.
Blank entry
The file has not yet been analyzed. When an analysis is complete, a new status will be assigned.
Trusted - Local
The file is considered to be safe. You can add the file to the global safe list so that it will be allowed to execute and will not generate alerts when it is identified on other devices.
The file is a Potentially Unwanted Program (PUP), indicating that it might be unsafe even if a user consented to downloading it. Some PUPs may be permitted to run on a limited set of systems in your organization (for example, a VNC application that is allowed to run on domain administrator devices). You can choose to waive or block PUPs on a per device basis, or add it to the global quarantine or safe list based on your organization's standards. The file can have any of the following sub-classes:
  • Adware
  • Corrupt
  • Game
  • Generic
  • Hacking Tool
  • Portable Application (does not require installation)
  • Scripting Tool
  • Toolbar
Dual Use
The file can be used for malicious and non-malicious purposes. For example, while PsExec can be a useful tool for executing processes on another system, that same feature can be used to execute malicious files on another system. The file can have any of the following sub-classes:
  • Crack (alters another application to bypass licensing limitations)
  • Generic
  • KeyGen (generate, reveal, or recover product keys)
  • Monitoring Tool
  • Pass Crack
  • Remote Access
  • Tool (administrative programs that can facilitate an attack)
The file has been identified as malicious software that is designed to disrupt, damage, or gain unauthorized access to your network, and should be removed as soon as possible. The file can have any of the following sub-classes:
  • Backdoor
  • Bot
  • Downloader
  • Dropper
  • Exploit
  • FakeAlert
  • Generic
  • InfoStealer
  • Parasitic
  • Ransom
  • Remnant
  • Rootkit
  • Trojan
  • Virus
  • Worm