Threats Management |
You can view the list of detected threats and manage the reaction to them on the Threats page. This page contains a full list of threats detected by Dr.Web for UNIX servers components. On the left, you can see a menu which allows filtering the threats by category: •All — show all detected threats (including both active and quarantined threats). •Active — show only active threats; that is, detected but yet to be neutralized. •Blocked — show all blocked threats (that is, threats that were not neutralized but the infected objects containing them were blocked (only for file storages monitored by SpIDer Guard for SMB). •Quarantined — show threats that were isolated in quarantine. •Errors — show threats that were not processed due to an error. On the right side of the category, the menu displays a number of detected threats that fall into this category. Active threats are indicated in bold on the menu. To display threats of a required category, click its name on the menu. For each threat, the following information is listed: •File — name of the file that contains a malicious object (file path is not specified). •Owner — name of the user who owns the infected file. •Component — name of the Dr.Web for UNIX servers component that detected the threat. •Threat — name of the threat that was detected in the file (as defined in the classification of Doctor Web). For an object selected in the list, the following information is displayed: •Name of the threat (displayed as a link that opens the page of Dr.Web virus library with the threat description). •File size, in bytes. •Name of the component that detected the threat. •Date and time when the threat was detected. •Date and time when the threat was last modified. •Name of the user who owns the infected file. •Name of the group that includes the file owner. •Name of the user who quarantined the file (only for file storages monitored by SpIDer Guard for SMB). •File identified in quarantine (if the file was quarantined). •Full path that points to the original file location (where the file was located at the moment of threat detection). To select an object in the list, click the corresponding list item. For multiple selection, click the boxes in the corresponding strings. To select all objects or cancel the selection, click the box in the File field in the threat list header. To apply actions to objects selected in the list, click the corresponding button on the toolbar, which is located directly above the threat list. The toolbar contains the following buttons (note that some of them can be unavailable depending on the type of selected threats):
You can also filter displayed threats based on the search query. To filter unnecessary threats out and display only those that correspond to the query, use the search box. The box is displayed on the right side of the toolbar and is marked with |