Threats by Hosts - level 4
For more about the information available in the View Details pages for malicious and suspicious files, see Appendix A: Job Details page reference.
When a file has been rescanned, the results of the rescan are displayed on this page. Select the job ID to view the job details. |
To create a snapshot report for all threats by users:
- Select a time period from the Time Period dropdown list.
- Click the Filter field to apply filters to further drill down the information in the report.
- Click the Export Data button in the toolbar.
- In the Report Generator, select either PDF or CSV for the report type.
- Click the Generate Report button to create the report.
- When the report generation is completed, select the Download button to save the file to your management computer. You can navigate away and find the report later in Log & Report > Report Center page.
- Click the Cancel button to exit the report generator.
The maximum number of events you can export to a PDF report is 1000. The maximum number of events you can export to a CSV report is 15000. Jobs over that limit are not included in the report. |