Anti-Malware Report
The Web > Reporting > Anti-Malware page is a security-related reporting page that reflects the results of scanning by your enabled scanning engines (Webroot, Sophos, McAfee, and/or Adaptive Scanning).
Use this page to help identify and monitor web-based malware threats.
Note | To view data for
malware found by L4 Traffic Monitoring, see
L4 Traffic Monitor Report.
|
From the Anti-Malware page, you can view the following information:
Section |
Description |
---|---|
Time Range (drop-down list) |
A drop-down list that can range from a day to 90 days or a custom range. For more information on time ranges and customizing this for your needs, see the Choosing a Time Range for Reports. |
Top Malware Categories: Monitored or Blocked |
This section displays the top malware categories that are detected by a given category type. This information is displayed in graph format. See Malware Category Descriptions for more information on valid Malware categories. |
Top Malware Threats: Monitored or Blocked |
This section displays the top malware threats. This information is displayed in graph format. |
Malware Categories |
The Malware Categories interactive table shows detailed information about particular malware categories that are displayed in the Top Malware Categories chart. Clicking on any of the links in the Malware Categories interactive table allows you to view more granular details about individual malware categories and where they are on the network. Exception: an Outbreak Heuristics link in the table lets you view a chart showing when transactions in this category occurred. See Malware Category Descriptions for more information on valid Malware categories. |
Malware Threats |
The Malware Threats interactive table shows detailed information about particular malware threats that are displayed in the Top Malware Threats section. Threats labeled “Outbreak” with a number are threats identified by the Adaptive Scanning feature independently of other scanning engines. |
Tip | To customize your view of this report, see Working with Web Security Reports. |