5.3 Malware Threat Details

This page provides detailed information about the threat and details of the devices that have been infected with the threat. The page is accessed by clicking a specific threat link in either the Antimalware page for a selected device or in the Top Malware Threats dashlet. Using the options in this page, you can perform scans, update the malware signature and update the Antimalware Agent on selected and infected devices.

5.3.1 Threat Information

This section displays the following information:

  • Type: The type of threat. For example, virus, adware, spyware, application, archive bomb, application, rootkit or dialer.

  • First Detected On: Date on which the threat was first detected on a device in the zone.

  • Device First Detected On: Name of the device on which the threat was first detected. You must have rights to the device to display the name. Click the device name link to view the device details page.

  • Last Detected On: Date on which the threat was last detected on a device in the zone.

5.3.2 Infected Devices

This section lists the names of devices that are infected with the selected threat along with the following information:

  • Device details such as the device name, the device type (workstation or server), device status (normal, retired, lost), operating system, user associated with the device, when was the device last refreshed and when did the device last contact the server.

  • Threat details such as the type of threat and when it was last detected on the device.

  • File details such as the number of suspicious or infected files and the full path to these files. Click the files link, to view the files section within the device Antimalware page. This section provides information about the status of the infected or suspicious files. The threat status includes, Disinfected, Quarantined, Deleted, Denied Access, and Ignored.

  • Scan details such as the types of scans, the scan schedule, which lists the details of the current schedule, the scan status (last and next scans) for the selected device, as well as the scan policy that will be implemented by each scheduled scan. To view the schedule configuration for a specific scan, click the link in the relevant scan schedule column.

  • Other details such as the department and site associated with the device.

5.3.3 Actions

Using this page, you can perform the following actions:

  • Scan Now:Performs the selected type of scan on the selected devices. The scan options include full, quick, custom and network. If you select custom or network, you need to browse and select the relevant custom or network scan policy.

  • Update Malware Signature: Forces a Malware Signature update on the selected devices if the signature is out dated.

  • Update Antimalware Agent:Forces an Antimalware Agent update on the selected devices if the Antimalware Agent is outdated on the selected devices.

  • Show or Hide columns:Click to select the columns that you want to display or hide in the grid.

  • Filter panel: Displays devices based on the selected filters. The filter options include Device Folders, Device Groups, Device Type, Operating System, Threat Status, Detection Period.