Smart file malware and anomaly scanning

A simple workflow for suspicious files

The product flow is designed so teams can move from intake to decision without losing track of what was uploaded, what was found, and what happened next.

Key points

  • Upload one file or a signed-in batch
  • Process scans through the queue and worker pipeline
  • Review reports, history, and share links in one workspace

Three stages

The flow

01

Upload and queue

Start with a guest scan for quick testing or sign in to queue one or many files for tracked processing.

02

Analyze and classify

The scan pipeline inspects file structure, type cues, entropy, indicators, and verdict conditions.

03

Review and respond

Use the report, history page, notifications, and analytics to decide what to block, share, or investigate further.

What is returned

Outputs users receive

Verdict and risk score

Each report returns a verdict with scoring that helps distinguish low-risk files from urgent items.

File metadata

The report includes hashes, type hints, size, and other context that helps validate what was uploaded.

Recommended next steps

Findings are paired with actionable guidance so the report is useful outside a security specialist workflow.

After the scan

Workspace follow-through

Queue visibility

Users can track queued, processing, completed, and failed jobs instead of waiting in a blind upload flow.

History retention

Completed reports remain available inside the account history window for later review and sharing.

Notification trail

Report-ready and usage events surface in the dashboard so the workflow stays visible.

Next step

See the process on a live upload

Run a guest scan or open the workspace to watch queued jobs move through the pipeline.