Active threats
Active threats
Information about unprocessed files that have been detected on client devices is stored in the Repositories folder, Active threats subfolder.
Postponed processing and disinfection are performed by the security application upon request or after a specified event occurs. You can configure the postponed processing.
Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.