Page tree

The Total Malware Events table displays detected malware events from the past 30 days. You can click the widget to filter the data in the table below the widgets.

The Malware Protection subagent detects the following malware types: 

  • TROJAN (TROJ)
  • WORM
  • EICAR (VIRUS)
  • VIRTUS
  • RANSOM (RANSOMWARE)
  • SPYWARE
  • ADWARE
  • COINMINER (COIN_MINER)


  1. In the Armor Management Portal (AMP), in the left-side navigation, click Security.
  2. Click Malware Protection.
  3. Review the widgets for malware events.

    WidgetDescription
    Clean

    This widget indicates that the infected file was cleaned.

    Pass

    This widget indicates that no action was taken on the infected file.

    Quarantine

    This widget indicates that the file was renamed, and then moved to a temporary location.

    Delete

    This widget indicates that an infected file was deleted.

    DenyAccess

    This widget indicates that an infected file has restrictive access. As a result, no action was taken.

    Other

    This widget indicates all other possible actions performed on the infected file, such as renaming the file.

  4. (Optional) Click a widget to filter the table.

    ColumnDescription
    NameThis column displays the name of the virtual machine or instance.
    Malware NameThis column displays the name of the malware detected in your virtual machine or instance.
    File NameThis column displays the location of the malware detected in your virtual machine or instance.
    Action Taken

    This column displays the action that took place in the file where the malware was detected:

    • Cleaned
    • Passed
    • Quarantined
    • Deleted
    • Denied Access
    • Other
    DateThis column displays the date when the malware was detected.