List of detections

The detection monitoring feature allows you to carry out searches of your network to know when your computers have been in danger, what types of threats have been detected, and which action was taken against them.

  1. Use the Options menu to enable a filter that will let you look for computers depending on the group and/or subgroup to which they belong and the type of detection.

  2. Select the type of threat detected or the source of the detection. You can also select All detections.

  3. Click Find.

 

Search results

Finally, you can get more details about detections. Click the [+] symbol next to the name or the IP address of any of the computers, and you will go to the Detection details window.

Detections made by the background scans of the Exchange Server protection (on Exchange 2007/Exchange 2010 servers) will appear as “Notified by: Intelligent mailbox scan”.

In some cases, you will be able to access information that offers on its website about certain threats. To do this, click View description.

 

Information about detections on Linux and OS X computers

The information displayed in the List of detection window for Linux and OS X computers is the same as for Windows computers.

 

Exporting the list

The list of detections made can be exported either to Excel or CSV format. To do this, click the relevant icon next to Export to.

Both formats include a header which specifies the date and time when the file was created, a summary of the search criteria, and the details of the list, including the source IP address of the infection(s).

Exported files will display the full path of the group (All\group1\group2).