Reference Guide

Manage Policies
232
The Protection tab provides information about files and scripts that are potentially harmful.
Threats
The table lists all events found across the organization. An event may also be a threat but is not
necessarily so.
View additional information about a specific threat either by clicking on the threat name link to view
details displayed on a new page or by clicking anywhere in the row of the threat to view details at the
bottom of the page.
To view additional threat information in the table, click the drop-down arrow on a column header to
select and add columns. Columns display metadata about the file, such as Classifications,
Cylance
Score (confidence level), AV Industry conviction (links to VirusTotal.com for comparison with other
vendors), Date first found, Data last found, SHA256, MD5, File information (author, description, version),
and Signature details.
Filter Events Table Data
Click the Threat Filters list at the upper right side of the table to view data about events by Priority,
Status: Last 24 Hours, and Status: Total.
The number of events occurring in each subcategory are shown in parentheses.
Priority: Unsafe - Select a priority to view only events that match the selected priority. High, Medium, or
Low.
Status: Last 24 Hours - Select a status to view only events that have had changes to this status in the
last 24 hours.
Status: Total - Select a status to only events with that status.
The predictive threat model used to protect devices receives periodic updates to improve detection
rates. To understand differences in how a new threat model affects information about files in your
organization, see Threat Model Updates
.
Commands
Select a threat to act on it. On this page, you can do the following to the selected threat data:
Export - Export threat data to a CSV file.
Select the rows to export, and then click Export.
Open the file with Microsoft Excel or similar application, which allows you to sort and organize the data.
Global Quarantine - Add a file to the global quarantine list. The threat is permanently quarantined from
all devices.
Add the selected file to the Global Quarantine list to prevent it from being run on any device in the
organization. Adding a file to Quarantine removes it from lists of Unsafe files.
1. Select a threat.
2. Click Global Quarantine.
3. Enter a reason that this file should be global quarantined and click Yes.
Safe - Add a file to the safe list. The file is permanently treated as safe across all devices.
1. Select the file to list as safe.
2. Click Safe.
3. Select the category that fits the file.