The Security Threats - Ransomware logs provide an overview of all the ransomware
threats detected on your network, regardless of the type of scan that detected the
threat.
Item
|
Description
|
Date/Time
|
The time the detection occurred
|
Security Threat
|
The name of the security threat
|
Category
|
The type of scan that detected the threat
|
File Path / URL
|
The location where the threat detection occurred or the list used to detect the malicious
website
|
Action
|
The action taken on the threat
|
Infection Channel
|
The channel the threat originated from
|
Endpoint
|
The endpoint on which the detection occurred
|