i think you’re both right here, you are inhabitants of different planets that’s all.
For you Alan I guess (only) that you do not want to see even a half shadow of any suspect files, and then that rather touchy tool works great.
In my case, it is way too touchy and leaves me with a tad to few choices.
A lot of 3rd-party security PE tools makes it go off its hinges and so I can’t use it as there are no viruses or named trojans anywhere but in the program’s routines, only packed, possibly encrypted security tools.
In other words, have to use something else