We have identified that certain APPMClient executables are being incorrectly flagged as malicious by some security software.
These detections are false positives, and the files can be safely ignored.
Below is a list of the affected executables along with their functionality
EXECUTABLE FILE | FUNCTIONALITY |
---|---|
appm_auto.exe | Handles auto-login functionality |
appm_chrome.exe | Supports Chrome-based operations, such as Web Autologin |
appm_edge.exe | Supports Edge-based operations, such as Web Autologin |
appm_audit.exe | Captures keyboard input and takes screenshots to log user activity |
APPMClient.exe | Main executable for users to connect to SecureKi |
APPMClientMain.exe |
ACTION REQUIRED
To prevent unnecessary security alerts and disruptions, please WHITELIST these files and exclude their directory (e.g. C:\APPMClient) from scanning to avoid future false positives.
For any further clarification or assistance, please reach out to SecureKi.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article