The View Threats page displays threats you can take action on. Threats are grouped by their status on two different tabs:
Note: When a machine is scanned, all of its current threats are cleared out and marked as resolved. If a threat continues to exist, it is rediscovered and added back to the current threats list.
Healing
Healing involves the following steps:
MS Exchange Server Threats
Any malware detected by MS Exchange Server email protection is immediately deleted from the MS Exchange Server and displays only on the Virus Vault tab.
Current Threats tab
Actions
Note: If both healing and deletion fail, it may mean the file is open. Kill any processes keeping the file open and try to delete the file again.
(P)
next to the name of the threat on the View Threats page. PUP threats can be added to the exclusion list for the profile assigned to the machine they were found on. Exclusion means the file is no longer scanned as a potential threat on all machines assigned this profile. Only perform this action if you're certain the file is safe to use. The entire PUP Exclusion List is maintained using the Define Profile > PUP Exclusions tab.Note: Non-PUP threats cannot be added to the PUP Exclusion List.
Virus Vault tab
Actions
Note: You cannot recover a file deleted from the Virus Vault.
(P)
next to the name of the threat on the View Threats page. PUP threats can be added to the exclusion list for the profile assigned to the machine they were found on. Exclusion means the file is no longer scanned as a potential threat on all machines assigned this profile. Only perform this action if you're certain the file is safe to use. The entire PUP Exclusion List is maintained using the Define Profile > PUP Exclusions tab.Note: Non-PUP threats cannot be added to the PUP Exclusion List.
Apply Filter / Reset Filter
Click Apply Filter to filter the rows displayed by the text entered in the Machine.Group, Threat Path or Threat Name fields. Time filtering and Action sorting occurs immediately. Click Reset Filter to display all rows of data.
Filter Columns
Filter the display of threats using text fields, a date range and/or drop-down lists. Include an asterisk (*) wildcard with the text you enter to match multiple records.
All OFF
or All ON
to enable or disable actions. Action sorting occurs immediately.