0
(0)

The Infections report allows you to easily monitor all infections detected and handled by the Elements Endpoint Protection product installed on wp-signup.phped devices. The report can be exported for further reference. You can also set up email alerts to notify designated individuals each time an Elements Endpoint Protection-protected device performs a specific action while handling an infection.

You can view the following details of the detected infections:

  • Date: The date and time when the infection was reported
  • Computer: The assigned name for the device with the infection. On clicking the name, the device details page will be displayed
  • Infection: The name of the malicious program that infected the computer. On clicking the name, a web browser page will open displaying further information on the malicious program
  • Type: The type of infection. There are three possible types:
    • Malware – A program that performs one or more actions that are harmful to the device or data saved on it
    • Spyware – A program that sends out or keeps data that can be used to track a specific device or user
    • Riskware – A program that may introduce a security risk if it is used inappropriately
  • Action: The action taken by the Elements Endpoint Protection product. Possible actions include:
    • Blocked – The infected object has been blocked from performing any further actions. Other files are not permitted to access a blocked object.
    • Renamed – The infected object has been renamed.
    • Stopped – Any current action being performed by the infected object has been halted.
    • Deleted – The infected object has been deleted.
    • Reported – The infected object has been reported to our analysis systems.
    • Disinfected – The malicious code has been deleted from the infected object.
    • Quarantined – The infected object has been moved to a safe repository for files that may be harmful.
    • Blocked and asked further action from user – The infected object has been blocked from performing any further actions. A dialog message has been shown to the user to ask what further action they would like to pursue
  • Infected object: The name of the object (for example, a program, a document file or a database) that has been infected
  • Company: The name of the company responsible for the infected computer.

    Note: When viewing the Infections report for a specific company, this column is not displayed.

Source : Official F-Secure Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 5 times, 1 visits today)