Threat Log Properties Tab - Details

Name – path (local or URL) to infected file and its name
Threat – name of the infiltration
Action – action taken after detection
Information - more detailed information about detection

 

Click Refresh to retrieve most current info about infiltrations from ERA Server.
Click Save As to export information about infiltration to a file of the txt, csv, or html format.
Click Copy to Clipboard to copy selected information to clipboard.