The list of active threats is presented as a table of events related to infected files that were not processed for some reason.
You can perform the following actions with files from the list of active threats:
View the list of active threats
Scan active threats from the list using the current version of Kaspersky Endpoint Security databases and modules
Restore files from the list of active threats to their original folders or to a different folder of your choice (when the original folder cannot be written to)
Remove files from the list of active threats
Open the folder where the file was initially located from the list of active threats
You can also perform the following actions while managing data in the table:
Filter active threats based on column values or custom filter conditions.
Use the active threat search function.
Sort active threats.
Change the order and arrangement of columns that are shown in the list of active threats
Group active threats.
If necessary, you can copy information about selected active threats to the clipboard.