The Infections report allows you to easily monitor all infections detected and handled by the Elements Endpoint Protection product installed on registered devices. The report can be exported for further reference. You can also set up email alerts to notify designated individuals each time an Elements Endpoint Protection-protected device performs a specific action while handling an infection.
You can view the following details of the detected infections:
- Date: The date and time when the infection was reported
- Computer: The assigned name for the device with the infection. On clicking the name, the device details page will be displayed
- Infection: The name of the malicious program that infected the computer. On clicking the name, a web browser page will open displaying further information on the malicious program
- Type: The type of infection. There are three possible types:
- Malware – A program that performs one or more actions that are harmful to the device or data saved on it
- Spyware – A program that sends out or keeps data that can be used to track a specific device or user
- Riskware – A program that may introduce a security risk if it is used inappropriately
- Action: The action taken by the Elements Endpoint Protection product. Possible actions include:
- Blocked – The infected object has been blocked from performing any further actions. Other files are not permitted to access a blocked object.
- Renamed – The infected object has been renamed.
- Stopped – Any current action being performed by the infected object has been halted.
- Deleted – The infected object has been deleted.
- Reported – The infected object has been reported to our analysis systems.
- Disinfected – The malicious code has been deleted from the infected object.
- Quarantined – The infected object has been moved to a safe repository for files that may be harmful.
- Blocked and asked further action from user – The infected object has been blocked from performing any further actions. A dialog message has been shown to the user to ask what further action they would like to pursue
- Infected object: The name of the object (for example, a program, a document file or a database) that has been infected
- Company: The name of the company responsible for the infected computer.
Note: When viewing the Infections report for a specific company, this column is not displayed.