Threats by Files - level 1
The following options are available:
Time Period |
Select the time period from the dropdown list. Select one of the following: 24 Hours, 7 Days, or 4 Weeks. |
Export Data |
Click the Export Data button to create a PDF or CSV snapshot report. The time period of jobs included in the report depends on the selection made in the Time Period dropdown. The time to generate the report is dependent on the number of events selected. You can wait until the report is ready to view, or navigate away and find the report later in the Log & Report > Report Center page. |
Search |
Show or hide the search filter field. |
Refresh |
Click the Refresh icon to refresh the entries displayed after applying search filters. |
Add Search Filter |
Click the Search Filter field to add search filters. Click the Cancel icon to the left of the search filter to remove the specific filter. Click the Clear All Filters icon in the search filter field to clear all filters. When the filter Filename is used, click the = sign to toggle between the exact and pattern search. Search filters can be used to filter the information displayed in the GUI. |
View Jobs |
Click the View Jobs icon to drill down the entry. |
Pagination |
Use the pagination options to browse entries displayed. |
This page displays the following information:
Filename |
The threat file name. Click the column header to sort the table by this column. |
Rating |
The file rating. Click the column header to sort the table by this column. |
# of Users |
The number of users affected. Click the column header to sort the table by this column. |
Timeline |
View the Threat Timeline Chart. When you hover over any dot, all victim hosts infected by that malware will appear in five minutes. When you click on any dot in the chart, all events associated will be displayed. When you click on an event, the View Details page will open. |
Total Files |
The number of files displayed and the total number of files. |