Contents
Index
Search
Search Knowledge Base
Collapse All
Expand All
Previous
Next
Search
Toggle Highlight
Threat Details
Threat details are available by clicking on the threat entry in the logs. The scan result is listed along with the file name, type, detection time, and path.