You can view the list of detected threats and manage the reaction to them on the page.
This page contains the full list of threats detected by the components of Dr.Web for UNIX Mail Servers that monitor and scan the file system. In the upper part of the page, you can see a menu which allows filtering the threats by their category:
•—show all detected threats (including both active and quarantined threats).
•—show only active threats; i.e. detected but not neutralized yet.
•—show all blocked threats, that is, threats that were not neutralized, but for which the infected objects containing them were blocked.
•—show threats that were moved to quarantine.
•—show threats that were not processed because of an error.
Just next to each name of a threat category (to its right) in the upper menu, the quantity of detected threats that fall into this category is displayed. The currently selected category, for which the threats belonging to it are currently displayed, is emphasized in a darker font. To display threats of a required category, click the name of the category in the menu.
For each threat, the following information is listed:
•—name of the file that contains a malicious object (file path is not specified).
•—name of the user who owns the infected file.
•—name of the component of Dr.Web for UNIX Mail Servers that detected the threat.
•—name of the threat that was detected in the file (according to the classification used by the Doctor Web company).
For any object selected in the list, the following information is displayed:
•Name of the threat (displayed as a link that opens a page of the Dr.Web virus information library with the threat description).
•File size, in bytes.
•Name of the component that detected the threat.
•Date and time when the threat was detected.
•Date and time when the threat was last modified.
•Name of the user who owns the infected file.
•Name of the group that includes the file owner.
•Identifier that was assigned to the quarantined file containing a threat (if the file was quarantined).
•Full path that points to the original location of the file (where the file was located at the moment of threat detection).
You can select any object in the list by clicking on it. To select multiple objects, select the check boxes for the corresponding objects. To select all objects or cancel the selection, select the check box in the field in the threat list header.
To apply actions to objects selected in the list, click the corresponding button on the toolbar, which is located directly above the threat list. The toolbar contains the following buttons (note that some of them can be unavailable depending on the type of selected threats):
You can also filter displayed threats based on a search query. To filter unnecessary threats out and display only those that correspond to the query, use the search box. The box is displayed on the right side of the toolbar and is marked with . To filter the threat list, enter a word in the search box. All threats that do not have the entered word in their name or description, will be hidden (this filtering is not case-sensitive). To clear search results and display the unfiltered list, click in the search box or erase the word.