View Threats
Security > View Threats
- Similar information is provided by Reports > Security.
The View Threats page displays threats you can take action on. Threats are grouped by their status on two different tabs:
- Current Threats - Lists discovered threats on machines that could not be automatically healed. Each unhealed threat remains unchanged on the machine, requiring administrator action. Deleting a threat on the Current Threats tab deletes the file immediately, without moving the file to the Virus Vault.
- Virus Vault - Threats are discovered by scan or resident shield. Healing the threat replaces the original file with a healed copy. The original, unhealed file is moved to a hidden partition on the computer hard drive called the Virus Vault. In effect, the Virus Vault acts as a kind of "recycle bin" for threats, allowing you to recover them before deleting them permanently from machines.
Healing
Healing involves the following steps:
- An attempt is made to clean the file.
- If that fails, an attempt is made to move the file to the Virus Vault.
- If that fails, an attempt is made to delete the file.
- If that fails, the file remains unchanged on the machine and is listed in the Current Threats tab of the View Threats page.
MS Exchange Server Threats
Any malware detected by MS Exchange Server email protection is immediately deleted from the MS Exchange Server and displays only on the Virus Vault tab.
Current Threats
The Current Threats tab provides you with the following actions:
Virus Vault
The Virus Vault tab provides you with the following actions:
Apply Filter / Reset Filter
Click Apply Filter to filter the rows displayed by the text entered in the Machine.Group, Threat Path or Threat Name fields. Time filtering and Action sorting occurs immediately. Click Reset Filter to display all rows of data.
Filter Fields
Filter the display of threats using text fields, a date range and/or drop-down lists. Include an asterisk (*) wildcard with the text you enter to match multiple records.
- Machine.Group - Filter by the machine ID.group ID of the managed machines reporting threats.
- Threat Path - Filter by pathname location of files on managed machines with reported threats.
- Time - Filter by a range of dates and times the threats were last detected. Time filtering occurs immediately.
- Threat Name - Filter by the name of the threat, as designated by the anti-malware definitions used to detect a threat.
- Category - Filter by the type of threat reported. Select
All OFF or All ON to enable or disable all categories. - Actions - Filter by pending or completed actions taken against view threat records. Select
All OFF or All ON to enable or disable actions. Action sorting occurs immediately.
|