To view information about the detections made on your computers, go to Detections in the Status window.
This section shows two panels displaying information about the detections made by the protection installed on your computers, by malware type and by source of detection.
The “Detections by type” graph will add the detections made on Linux systems to the relevant categories. If the category cannot be identified, the relevant detection will be added to Other.
In the “Detections by source” graph, detections made on Linux systems will be added to the File system category.
The “Detections by type” graph will add the detections made on OS X systems to the Virus category.
In the “Detections by source” graph, detections made on OS X systems will be added to the File system category.
To see detections over a given period of time, select an option in the Period menu and click Apply.
Displays detections of each type of threat. It also displays information about the total number of intrusion attempts, devices, dangerous operations and tracking cookies blocked.
Malware URLs are included in the Other category, whereas phishing URLs are included in the phishing category.
Indicates the protection unit that detected the item.
It includes the detections reported by the following protections:
File system
Web (detection of malware and/or phishing Web pages)
Firewall
Device control (access denied to USB flash drives, CD/DVD readers, image and Bluetooth devices)
Exchange Server (detections on Exchange servers)
Click on the graphs to expand them. You can also print them if you want.
If you want to see a list of scheduled scans, click the Scheduled scans link.
Click List of detections for more information about detections.
The list of detections shows the items detected over the last seven days.