An extern instance validates the computer systems through remote attistation, securing the integrity of a single system. This central component uses a collection of reference-data to uncover anomalies. Anonymized acquisition of local data helps to improve the detection through heuristic. Reports upon malware infestation can be analyzed centrally. Infested computer systems use a backward channel to process necessary configurations.