Home > The Status window > Detection details > Detection details
The detection monitoring feature allows you to carry out searches of your network to know when your computers have been in danger, what types of threats have been detected, and which action was taken against them.
To access this information, click the Detection details link in the Status window.
Use the drop-down menu to select the information you want to see:
Detected threats. This option shows the entire list of malware categories and the number of times they have been detected during the specified time period.
Computers with most threats. Shows the computers with most detections, ordered by the number of detections.
Most detected malware. Shows the malware items most frequently detected on your computers.
In all cases, use the drop-down menu in the upper-right corner of the window to display data for the last 7 days, last 24 hours or last month.
The information displayed in the Detection details window for Linux and OS X computers is the same as for Windows computers.
Click the icon to look for detailed information about a specific threat type.
You can search for information about threats belonging to the following categories:
Viruses and spyware
Suspicious files
Hacking tools and PUPs (potentially unwanted programs)
Malware URLs
Devices blocked
Other threats
Dangerous actions blocked
Phishing and fraud
Intrusion attempts blocked
Tracking cookies
The search results will display detailed information about the malware item detected, the computers where it was found, the action taken against it (disinfect, send to quarantine,...) and the date of detection.
You can also filter the information based on where the threat was detected (file system, email, Exchange Server).
In the case of blocked devices, use the filter to select the type of device.
Use the drop-down menu to look for information about a specific threat type.
The search results will display the computers where the threat was detected, the group the computer belongs to, the number of detections and the date when the item was first and last detected.
Click the number of detections and then the icon next to the threat type. This will show the computers where the threat was detected, the action taken against it (disinfect, send to quarantine,...) and the date of detection.
Use the drop-down menu to look for information about a specific threat type.
Viruses and spyware
Hacking tools and PUPs
Tracking cookies
Other threats
The search results will display the name and type of the detected malware, the number of detections and the date when the item was first and last detected.
In some cases you will be able to access additional information about the malware item on Panda Security's website. To do this, click the name of the threat.
Detections made by the Exchange Server protection background scans (in Exchange 2007/Exchange 2010) will appear as “Notified by: Intelligent mailbox scan”.
In Exchange 2003 it is not possible to differentiate between items detected by the background scan or by other types of scans. They will appear as “Notified by: Exchange Server Protection”.
The list of detections can be exported either to Excel or CSV format. To do this, click the Export button at the top of the window.
In the Export detected threats window, select a time period (last 24 hours, last 7 days, last month) and the threats to include in the report.
Both formats -Excel and .CSV- will include a header which specifies the date and time when the file was created, a summary of the search criteria, and the details of the list, including the source IP address of the infection(s).
Exported files will display the full path of the group (All\group1\group2)