Anti-Malware Page
The Anti-Malware report page is a security-related reporting page that reflects the results of scanning by your enabled scanning engines (Webroot, Sophos, McAfee, and/or Adaptive Scanning).
To view the Anti-Malware report page, select Web from the Product drop-down and choose Monitoring > Anti-Malware from the Reports drop-down. For more information, see Using the Interactive Report Pages.
You can use this page to help identify and monitor web-based malware threats.
Note | To view data for malware found by L4 Traffic Monitoring, see Layer 4 Traffic Monitor Page |
From the Anti-Malware page, you can view the following information:
Section |
Description |
---|---|
Time Range (drop-down list) |
Choose the time range for your report. For more information, see the Choosing a Time Range for Reports. |
Top Malware Categories |
You can view the top malware categories that are detected by a given category type, in graphical format. See Malware Category Descriptions for more information on valid Malware categories. To customize the view of the chart, click |
Top Malware Threats |
You can view the the top malware threats in graphical format. To customize the view of the chart, click |
Malware Categories |
The Malware Categories interactive table shows detailed information about particular malware categories that are displayed in the Top Malware Categories chart. Clicking on any of the links in the Malware Categories interactive table allows you to view more granular details about individual malware categories and where they are on the network. Exception: an Outbreak Heuristics link in the table lets you view a chart showing when transactions in this category occurred. See Malware Category Descriptions for more information on valid Malware categories. |
Malware Threats |
The Malware Threats interactive table shows detailed information about particular malware threats that are displayed in the Top Malware Threats section. Threats labeled “Outbreak” with a number are threats identified by the Adaptive Scanning feature independently of other scanning engines. |
Tip | To customize your view of this report, see Working with Web Security Reports. |