McAfee TSA00M005PAA Processor Guide - Page 78

Detections report

Page 78 highlights

Using Virus and Spyware Protection Reports for virus and spyware protection Detections report Use the Detections report to view and manage the types of potentially malicious code or unwanted programs that have been found on the network. Select the information that appears in this report How to use this report Select this option... Report period Detection type To do this... Specify the period of time for which to display information. Select from the last week or one of the last 12 months. Show all threat detections or a particular type. • Malware Infections - Known threats that would infect the computer if they were not caught. • Potentially Unwanted Programs - Programs that you have not approved to run on client computers. • Buffer Overflow Processes - Unwanted code that attempted to run in reserved memory but was stopped. • Cookies - Data files containing personal information that are created by a web server and stored on your computer. Cookies allow web servers to recognize you and track your preferences when you visit Internet sites. View Groups List the computers where detections occurred, the names of detections, or the groups containing computers where detections occurred. Display all the computers on your account or only those in a single group. How to use this report When you want to... Do this... Display computers or detections Click the triangle icon next to a name. • Under a computer name, show which detections were found. • Under a detection name, show the computers where it was found. Click a group name to display computers in that group. View details about detections If detections are listed for a computer, click a quantity to display details. • Click a quantity for Detected Objects to display a list of detected threats and their status. • From the Detections List, click the name of a detection to display detailed information from the McAfee Avert Labs Threat Library. View details about a computer Click a computer name to display the Computer Details page, which displays where a detection occurred information about the computer, its service components, and its detections. 78 McAfee Total Protection Service Product Guide Select this option... To do this... Report period Specify the period of time for which to display information. Select from the last week

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

78
McAfee Total Protection Service Product Guide
Detections report
Use the Detections report to view and manage the types of potentially malicious code or
unwanted programs that have been found on the network.
Select the information that appears in this report How to use this report
How to use this report
To do this...
Select this option...
Specify the period of time for which to display information. Select from the last week
or one of the last 12 months.
Report period
Show all threat detections or a particular type.
Detection type
Malware Infections
— Known threats that would infect the computer if they
were not caught.
Potentially Unwanted Programs
— Programs that you have not approved
to run on client computers.
Buffer Overflow Processes
— Unwanted code that attempted to run in
reserved memory but was stopped.
Cookies
— Data files containing personal information that are created by a
web server and stored on your computer. Cookies allow web servers to
recognize you and track your preferences when you visit Internet sites.
List the computers where detections occurred, the names of detections, or the groups
containing computers where detections occurred.
View
Display all the computers on your account or only those in a single group.
Groups
Do this...
When you want to...
Click the triangle icon next to a name.
Display computers or detections
Under a computer name, show which detections were found.
Under a detection name, show the computers where it was found.
Click a group name to display computers in that group.
If detections are listed for a computer, click a quantity to display details.
View details about detections
Click a quantity for Detected Objects to display a list of detected threats and
their status.
From the Detections List, click the name of a detection to display detailed
information from the McAfee Avert Labs Threat Library.
Click a computer name to display the Computer Details page, which displays
information about the computer, its service components, and its detections.
View details about a computer
where a detection occurred
Using Virus and Spyware Protection
Reports for virus and spyware protection