Error Codes Wiki

Windows Defender Threat Detected — Quarantined File Recovery and False Positives

Errorsecurity

Overview

Fix Windows Defender threat detection alerts by reviewing quarantined files, handling false positives, and restoring legitimate files that were incorrectly flagged.

Key Details

  • Windows Defender automatically quarantines files it identifies as threats based on signature and heuristic analysis
  • Quarantined files are moved to a protected folder and cannot be executed or accessed normally
  • False positives are common with development tools, game trainers, keygens, and custom scripts
  • Quarantine history shows what was detected, when, and what action was taken
  • Real-time protection scans files as they are downloaded, opened, or executed

Common Causes

  • Legitimate software using techniques similar to malware (code injection, registry modification, hooking)
  • Development tools or scripts matching heuristic malware patterns
  • Actually malicious file detected correctly by Defender
  • Outdated Defender definitions flagging a previously clean file after a signature update

Steps

  1. 1Review the threat: Windows Security > Virus & threat protection > Protection history to see details
  2. 2Verify the file is safe: upload to VirusTotal.com to check against 70+ antivirus engines
  3. 3Restore from quarantine if safe: Protection history > select the item > Actions > Restore
  4. 4Add an exclusion to prevent re-quarantine: Virus & threat protection > Manage settings > Exclusions > Add
  5. 5Report the false positive to Microsoft: use the Microsoft Security Intelligence submission portal

Tags

windows-defenderquarantinefalse-positivethreatantivirus

Related Items

More in Security

Frequently Asked Questions

Quarantined files are stored in C:\ProgramData\Microsoft\Windows Defender\Quarantine in an encrypted format. You cannot access them directly — use Windows Security > Protection history to manage them.