How to Use Datum Malware Cleaner: Step-by-Step Guide
1. Download and install
- Visit the official Datum Malware Cleaner website and download the installer for your OS.
- Open the downloaded file and follow the installer prompts (accept EULA, choose install location).
- Restart your computer if the installer requests it.
2. Update definitions
- Launch Datum Malware Cleaner.
- Go to Settings or Update and click Check for updates to download the latest malware definitions and program updates.
3. Configure scan type
- Quick Scan: scans common infection areas (faster).
- Full/System Scan: scans entire disk(s) and running processes (recommended on first run).
- Custom Scan: select specific drives or folders.
Choose Full/System Scan for first-time use or if you suspect deep infection.
4. Run the scan
- Click Scan or Start Scan.
- Monitor progress; let the scan finish without interrupting the system if possible.
- Review the scan summary when complete (infections found, severity, file paths).
5. Review and quarantine/remove threats
- For each detected item, choose an action: Quarantine, Delete, Ignore, or Repair (if available).
- Quarantine is safest—isolates files so you can restore if needed.
- Delete for confirmed malicious files you no longer need.
- Use Repair for infected system files where available.
6. Restart if required
If Datum Malware Cleaner recommends a restart to complete removal, save work and reboot the system.
7. Run a follow-up scan
After reboot, run another Full/System Scan to ensure no residual threats remain.
8. Enable real-time protection and scheduled scans
- In Settings, enable Real-time Protection (if included) to block threats proactively.
- Set up Scheduled Scans (daily or weekly) and automatic updates for definitions.
9. Clean up and restore false positives
- If a legitimate file was quarantined, use the Quarantine manager to restore it.
- Submit suspicious files to Datum support for analysis if unsure.
10. Prevent reinfection
- Keep OS and applications updated.
- Avoid downloading from untrusted sources.
- Use strong, unique passwords and enable multi-factor authentication where possible.
- Regularly back up important data to an external drive or cloud.
If you want, I can provide a short checklist you can print and follow during the cleanup.