Reference Guide
Security Management Server v10.2.11 AdminHelp
Auto Run - Indicates whether the file was set to automatically run upon startup.
Detected By - Indicates whether the file was detected by Execution Control or by Memory
Protection.
Configure the Threat List
Add or Remove Columns
Click an arrow next to any column header and select Columns to add columns to, or remove columns from, the
table.
Filter on Column Data
To filter the list based on column data, click the down-arrow on any column to display the context menu, and
select Filter.
The filter options vary, depending on the type of data in the column. For example, you may want to filter the list
so that it shows only high priority threats.
Group by a Column
Drag a column header, such as Status, to the area directly above the column headers to group the data by
Status. When you drag a column header, it turns green, indicating that the table can be grouped by that data.
You can drag additional headers over the table to group the data even further.
For each group, a number displays in parentheses to indicate the total number of threats that share that
group's attribute.
Commands:
Select the check box next to a file name to perform an action on the file. To select all files, select the
check box in the column heading row.
Export
Export lets you export selected data to a .CSV file so that you can view the data in Excel or a similar
application which has powerful sorting/organizing features.
After selecting the data to export, click Export to save the data in a .CSV file.
Quarantine
Click Quarantine to add the file to the Quarantine list.
Quarantining a file will prevent the file from being executed on this device.
Note: Quarantining a file will move the file from its original location to the Quarantine directory
(C:\ProgramData\Cylance\Desktop\q).
Waive
Click Waive to allow the file to run on this device.
Note: Occasionally, a “good” file could be quarantined or reported. This could happen if the features of
that file strongly resemble those of malicious files. Waiving or globally safe listing the file can be useful
in these instances.
Exploit Attempts
This section lists the detection of attempts to exploit running processes, or malware that executes from
within memory space.
A number displays the total number of events, followed by the number in each subcategory.
87