Administrator Guide
Threats tab
The Threats tab displays all threats discovered on the device and the action taken. Threats are a category of events that are
newly detected as potentially unsafe files or programs and require guided remediation.
The Category column can include the following.
● Unsafe - A suspicious file that is likely to be malware
● Abnormal - A suspicious file that may be malware
● Quarantined - A file that is moved from its original location, stored in the Quarantine folder, and prevented from executing
on the device.
● Waived - A file allowed to execute on the device.
● Cleared - A file that has been cleared within the organization. Cleared files include files that are Waived, added to the Safe
list, and deleted from the Quarantine folder on the device.
For more information about Advanced Threat Prevention threat classifications, see AdminHelp, available in the Management
Console.
Exploits tab
The Exploits tab lists exploits, which are considered threats.
Dell Server policies determine the action taken when an exploit is detected:
● Ignore - No action is taken against identified memory violations.
● Alert - The memory violation is recorded and reported to the Dell Server.
● Block - The process call is blocked if an application attempts to call a memory violation process. The application that made
the call is allowed to continue to run.
Tasks
45