Change Language
wds-media
  • Home
  • VPN
Cloud-based threat scanner by Threat Protection Pro™

Cloud-based threat scanner by Threat Protection Pro™

  • By Admin


Threat Protection Pro™ is an all-in-one cybersecurity tool that protects you from online threats. Integrated within NordVPN desktop apps, it scans downloaded files for malware, blocks trackers, ads, and malicious sites, and prevents phishing attempts — all without requiring a VPN connection. Among its many features is the cloud-based threat scanner, which adds an extra layer of anti-malware protection. Let’s explore this feature in more detail.

What is the cloud-based threat scanner feature?
The cloud-based threat scanner is a deep file-scanning tool within Threat Protection Pro™. It utilizes the cloud for deeper analysis. This way, it improves malware detection beyond what a standard malware scanner can do and provides an additional layer of protection between your device and rare and unknown threats.

How does the cloud-based threat scanner work?
The cloud-based threat scanner provides an additional layer of protection for your device, taking malware detection one step further. If the Threat Protection Pro™ engine cannot determine whether a file is malicious with a quick scan, the scanner uploads the possibly infected file to a cloud server, where it will be executed within a controlled environment to assess its behavior. This process, known as sandboxing, allows the scanner to observe the file’s behavior and identify potential threats. By running the file in a virtual environment, the dangerous activity is contained and identified before it reaches your system.

Though uploading files for cloud-based scanning introduces a slight delay in the scanning process due to added latency, the increased security is well worth it. This deeper level of analysis ensures that even advanced threats can be caught.

{SHORTCODES.blogRelatedArticles}
How to enable cloud-based threat scanning
Activating the cloud-based threat scanner is incredibly simple, but it requires separate user consent because it involves uploading certain files to the cloud for advanced analysis. Since it’s part of file protection, within Threat Protection Pro™, you must first ensure that Threat Protection Pro™ and file protection are turned on. Once activated, the option to enable cloud-based threat protection becomes available, and you can easily toggle it on or off at any time, based on your preferences.

To activate the cloud-based file scanning, simply follow these steps:
Open and log in to the NordVPN app. Click on the shield icon in the left-side menu to activate Threat Protection Pro™. Follow the on-screen instructions to allow Threat Protection Pro™ to run on your device. To turn on cloud-based threat detection, click on the shield icon again. Then go to “Settings” and toggle the switch next to “Cloud-based threat detection.” Threat Protection Pro™ is available with selected NordVPN plans, so ensure your subscription includes it.

What files can be uploaded for cloud-based threat scanning?
Not all files are eligible for cloud-based scanning. The following rules dictate what can be uploaded to the cloud:
Only portable executable files, such as “.exe” or “.dll,” can be uploaded. Files containing personal data, including images, PDFs, or text documents, are never uploaded, ensuring your privacy is fully protected. Files that require additional software to open will be treated as personal data and will not be sent to the cloud. Files larger than 4MB are not eligible for cloud-based scanning to maintain efficiency and speed.


Uploading files to the cloud to be scanned for threats is completely safe. Threat Protection Pro™ ensures that only executable files are sent to the cloud, and all personal data remains untouched. This approach follows standard cloud security practices, which use strong measures to protect data from unauthorized access or breaches.

),
},
{
question: ‘What files commonly contain malware?’,
answer: (

Malware is most often found in executable files like “.exe” or “.dll,” which are designed to run or execute on your device. However, these types are not the only ones. The truth is that any type of file can contain malicious code. Malware is often hidden in email attachments, such as document files ending in “.pdf” or “.doc.”

You can get a virus just by opening an infected attachment. Even files from trusted sources may carry malware. To stay safe, download the file without opening it and scan it with a file checker to detect any hidden threats.

),
},
{
question: ‘Why does cloud-based threat scanning require additional user consent?’,
answer: (

Uploading files to the cloud requires additional user consent because it involves transferring data from your local device to a remote cloud server. While no personal data is uploaded, this step ensures transparency and allows users to make an informed decision about how their files are handled.

),
},
]}
/>

The post Cloud-based threat scanner by Threat Protection Pro™ first appeared on NordVPN.

Cheesy Gnocchi Broccoli Bake: Dairy Free

Cheesy Gnocchi Broccoli Bake: Dairy Free

Read More