Views:

The Threats tab on the Endpoint information screen allows you to view all security threats detected on a specific endpoint.

You can access the Threats tab on the Endpoint information screen from the following locations:

  • Endpoints with Threats widget: Click a count in the Threats column

    For more information, see Endpoints with Threats Widget.

  • Endpoint Details screen: Click a count in the Threats column

    For more information, see Endpoint Details.

  • Affected Users tab on the Security Threat screen: Click an endpoint name in the Host Name column

    For more information, see Affected Users.

  • Task: Allows you to Assign tags, or Isolate or Restore connections to the endpoint.

    For more information, see Isolating Endpoints.

  • Security Threats Over Time: Provides a graphical representation of threat information based on the time of the detection and whether the detection occurred on an assigned endpoint or the user's account

    • Hover over a threat icon (for example, ) to view details about the detection.

    • Change the displayed time interval by changing the Zoom value.

    • Change the end date by scrolling through the dates displayed under the graph.

    • Apply filters by clicking the funnel icon () and selecting the following criteria and using the OR or AND operators to build advanced filters.

      • Threat type: Select a threat category from the second drop-down list

      • Security threat: Type a malware name or suspicious URL, IP address, or sender email address

      • Threat status: Select Resolved by product, Action required, or Resolved manually

  • Security Threat Details: Provides more detailed information about the threats displayed on the Security Threats Over Time graph

    • Click a value in the Security Threat column to view the Affected Users screen.

      For more information, see Affected Users.

    • Click View link in the Details column to view detailed information.

    • Click a flag icon in the Threat Status column () to change the threat status for threats that require remediation.

      Note:

      Changing the threat status for a threat does not actually resolve the threat. The threat status is a case handling tool to help administrators track identified threats and indicate to other administrators that a threat has been resolved.

      Threat Status

      Description

      Resolved by product ()

      Indicates that the threat has been resolved by a managed product

      Note:

      You cannot change this threat status.

      Action required ()

      Indicates that remediation is required

      Click the Action required icon () to change the threat status to Resolved manually ().

      Resolved manually ()

      Indicates that remediation has been performed by an administrator

      Click the Resolved by product icon () to change the threat status to Action required ().