Working with the list of active threats

The list of active threats is presented as a table of events related to infected files that were not processed for some reason.

You can perform the following actions with files from the list of active threats:

You can also perform the following actions while managing data in the table:

If necessary, you can copy information about selected active threats to the clipboard.

In this section:

Start custom scan task for files from the list of active threats

Deleting entries from the list of active threats

Page top