To fully use this screen, you must add the following permissions to your account:
- Read AVAM
- Writer Trend Manual Scan
- Read Trend Manual Scan
View Malware Events
The Total Malware Events table displays detected malware events from the past 30 days. You can click the widget to filter the data in the table below the widgets.
The Malware Protection subagent detects the following malware types:
- TROJAN (TROJ)
- EICAR (VIRUS)
- RANSOM (RANSOMWARE)
- COINMINER (COIN_MINER)
- In the Armor Management Portal (AMP), in the left-side navigation, click Security.
- Click Malware Protection.
Review the widgets for malware events.
This widget indicates that the infected file was cleaned.
This widget indicates that no action was taken on the infected file.
This widget indicates that the file was renamed, and then moved to a temporary location.
This widget indicates that an infected file was deleted.
This widget indicates that an infected file has restrictive access. As a result, no action was taken.
This widget indicates all other possible actions performed on the infected file, such as renaming the file.
(Optional) Click a widget to filter the table.
|Name||This column displays the name of the virtual machine or instance.|
|Malware Name||This column displays the name of the malware detected in your virtual machine or instance.|
|File Name||This column displays the location of the malware detected in your virtual machine or instance.|
This column displays the action that took place in the file where the malware was detected:
- Denied Access
|Date||This column displays the date when the malware was detected.|
View Detailed Malware Protection Data
The Malware Protection details screen displays the malware that has been detected in your virtual machine or instance. This screen only shows data for the last 90 days.
In the Armor Management Portal (AMP), in the left-side navigation, click Security.
Click Malware Protection.
Locate and select the desired virtual machine or instance.
|The name of the malware detected in your virtual machine or instance.|
|File Name||The location of the malware detected in your virtual machine or instance.|
The action taken against the malware:
- Deny Access
|Date||The date when the malware was detected.|
Export Malware Protection Data
Was this helpful?