Kaspersky Endpoint Security for Windows 11.2.0

Working with the list of active threats

The list of active threats is presented as a table of events related to infected files that were not processed for some reason.

You can perform the following actions with files from the list of active threats:

  • View the list of active threats
  • Scan active threats from the list using the current version of Kaspersky Endpoint Security databases and modules
  • Restore files from the list of active threats to their original folders or to a different folder of your choice (when the original folder cannot be written to)
  • Remove files from the list of active threats
  • Open the folder where the file was initially located from the list of active threats

You can also perform the following actions while managing data in the table:

  • Filter active threats based on column values or custom filter conditions.
  • Use the active threat search function.
  • Sort active threats.
  • Change the order and arrangement of columns that are shown in the list of active threats
  • Group active threats.

If necessary, you can copy information about selected active threats to the clipboard.