User guide
View Logs
12
Only perform this action if you're certain the file is safe to use. The entire PUP Exclusion List is
maintained using the Define Profile (page 20) > PUP Exclusions tab.
Note: Non-PUP threats cannot be added to the PUP Exclusion List.
Virus Vault tab
Actions
Restore - Restores the original file identified as a threat. Only perform this action if you're certain
the file is safe to use.
Delete - Deletes the original file identified as a threat from the Virus Vault.
Note: You cannot recover a file deleted from the Virus Vault.
Remove from this List - Removes the threat from the View Threats page without performing any other
action.
Cancel Pending Operation - Cancels any of the other actions, if they have not yet been completed.
Add to PUP Exclusion List - A threat is identified as a potential unwanted program, or PUP, by
displaying a (P) next to the name of the threat on the View Threats page. PUP threats can be
added to the exclusion list for the profile assigned to the machine they were found on. Exclusion
means the file is no longer scanned as a potential threat on all machines assigned this profile.
Only perform this action if you're certain the file is safe to use. The entire PUP Exclusion List is
maintained using the Define Profile (page 20) > PUP Exclusions tab.
Note: Non-PUP threats cannot be added to the PUP Exclusion List.
Apply Filter / Reset Filter
Click Apply Filter to filter the rows displayed by the text entered in the Machine.Group, Threat Path or Threat
Name fields. Time filtering and Action sorting occurs immediately. Click Reset Filter to display all rows of
data.
Filter Columns
Filter the display of threats using text fields, a date range and/or drop-down lists. Include an asterisk (*)
wildcard with the text you enter to match multiple records.
Machine.Group - Filter by the machine ID.group ID of the managed machines reporting threats.
Threat Path - Filter by pathname location of files on managed machines with reported threats.
Time - Filter by a range of dates and times the threats were last detected. Time filtering occurs
immediately.
Threat Name - Filter by the name of the threat, as designated by the anti-malware definitions used
to detect a threat.
Action - Filter by pending or completed actions taken against view threat records. Select All OFF
or All ON to enable or disable actions. Action sorting occurs immediately.
View Logs
Security > View Logs
Similar information is provided by Info Center > Reporting > Reports > Security (page 33).
The View Logs page displays the security protection event log of each machine ID licensed to use
Endpoint Security. The list of machine IDs displayed depends on the Machine ID / Group ID filter and
machine groups the user is authorized to see using System > User Security > Scopes. To display on