The Infections report allows you to easily monitor all infections detected and handled by the Elements Endpoint Protection product installed on wp-signup.phped devices. The report can be exported for further reference. You can also set up email alerts to notify designated individuals each time an Elements Endpoint Protection-protected device performs a specific action while handling an infection.
You can view the following details of the detected infections:
- Date: The date and time when the infection was reported
- Computer: The assigned name for the device with the infection. On clicking the name, the device details page will be displayed
- Infection: The name of the malicious program that infected the computer. On clicking the name, a web browser page will open displaying further information on the malicious program
- Type: The type of infection. There are three possible types:
- Malware – A program that performs one or more actions that are harmful to the device or data saved on it
- Spyware – A program that sends out or keeps data that can be used to track a specific device or user
- Riskware – A program that may introduce a security risk if it is used inappropriately
- Action: The action taken by the Elements Endpoint Protection product. Possible actions include:
- Blocked – The infected object has been blocked from performing any further actions. Other files are not permitted to access a blocked object.
- Renamed – The infected object has been renamed.
- Stopped – Any current action being performed by the infected object has been halted.
- Deleted – The infected object has been deleted.
- Reported – The infected object has been reported to our analysis systems.
- Disinfected – The malicious code has been deleted from the infected object.
- Quarantined – The infected object has been moved to a safe repository for files that may be harmful.
- Blocked and asked further action from user – The infected object has been blocked from performing any further actions. A dialog message has been shown to the user to ask what further action they would like to pursue
- Infected object: The name of the object (for example, a program, a document file or a database) that has been infected
- Company: The name of the company responsible for the infected computer.
Note: When viewing the Infections report for a specific company, this column is not displayed.