You receive an ESET UEFI detection


  • Your ESET product notifies you of a UEFI detection (for example, EFI/CompuTrace, Win32/CompuTrace, EFI/Lenovo, Win32/Lenovo)
  • What is UEFI malware and how to prevent them
  • How to resolve detections of applications in UEFI


The UEFI firmware loads into the memory at the beginning of the boot process. It is stored in a flash memory chip soldered onto the mainboard. If attackers infect the firmware, they can deploy malware that survives system reinstallations, reboots and even new hard drive installations. The malware can also remain unnoticed by antimalware solutions since most of them do not scan the firmware layer.

The ESET UEFI Scanner adds an industry-first protection layer against UEFI bootkits by scanning for malware in the firmware layer. 

The following ESET products contain the UEFI scanner:

  • ESET Mail Security for Microsoft Exchange Server (version 7)
  • ESET File Security for Microsoft Windows Server (version 7)
  • ESET Security for Microsoft SharePoint Server (version 7)
  • ESET Mail Security for IBM Domino (version 7)
  • ESET File Security for Azure
  • ESET Smart Security Premium (version 11 and later)
  • ESET Internet Security (version 11 and later)
  • ESET NOD32 Antivirus (version 11 and later)
  • ESET Endpoint Security/Antivirus (version 7 only)



ESET detects UEFI malware or applications

UEFI scanning is available in the latest versions of ESET products. See the Details section above for a list of ESET products that contain the UEFI scanner. 

By default, the detection of potentially unsafe or unwanted applications is disabled in ESET products. Because UEFI infections are very specific to the hardware firmware that they infect, ESET can only detect and notify you of a UEFI infection. UEFI is only scanned during startup scan or during On-demand scan when the option "Boot sectors/UEFI" is selected.

Figure 1-1

How to protect your computer from UEFI malware

  • Use a computer with a newer chipset
    Verify all of your systems have modern chipsets with Platform Controller Hub (starting from Intel Series 5 chipsets onwards).
  • Ensure that your computer has Secure Boot enabled  
    Typically, UEFI malware is not properly signed and having Secure Boot enabled will keep it from loading and infecting your computer.
  • Upgrade your UEFI firmware on your computer
    We recommend that you perform a UEFI firmware update even if your computer does not notify you of a detection. As a preventive measure, it may help minimize the chances of this type of infection. 

How to resolve ESET UEFI detections

Since UEFI detections are specific to the hardware firmware that they are on, ESET cannot remove a UEFI detection. See below for possible remediation steps you can take.

For detailed information about UEFI malware including prevention and remediation, see the following post: Lojax: First UEFI rootkit found in the wild, courtesy of the Sednit group

If you are still unable to resolve your issue, please email ESET Technical Support.

Additional resources