You can sort, hide, and display data in tables and reports, as follows:
- Quick sort on a column — Click the column head to sort by that subject. For example, to sort data by policy name, click the Policy column header.
- Change the ascending or descending order — Click the drop-down arrow at the end of a column header to display the drop-down menu. Select either Sort Ascending or Sort Descending to change the order of data points in a column.
- Show or hide columns — Click at the end of a column header to display the drop-down arrow, then click the arrow to display the menu. Select a checkbox to display a column. Deselect a checkbox to hide a column.
The following table describes subject data that may display in Endpoint Protection tables and reports. The data that displays depends on the type of table or report displayed.
The language selected when SecureAnywhere was installed:
en — English
ja — Japanese
es — Spanish
fr — French
de — German
it — Italian
nl — Dutch
ko — Korean
zh-cn — Simplified Chinese
pt — Brazilian Portuguese
ru — Russian
tr — Turkish
zh-tw — Traditional Chinese
The version of the SecureAnywhere software installed on the endpoint.
More information about the endpoints where a file was detected and blocked.
More information about the SecureAnywhere versions where a file was detected and blocked.
Approx Scan Time
The duration of a scan in minutes and seconds.
A flag for the country where the endpoint is located.
The Webroot classification of the file, which can be Good, Bad, or Undetermined.
If you hover over the classification, the system displays information on how this classification was reached.
The number of days the endpoint remained infected.
A Machine ID value that identifies the hardware for an endpoint. Webroot uses an algorithm to determine this value.
The time the threat has been present on the device. It is calculated from the first time the file is active to when the file was last seen.
For more information, see About Dwell Time.
The number of endpoints with a detected file.
The size of the file in bytes.
The file name of the detected threat.
The date and time a threat was detected.
The date and time this endpoint first checked into the Management Portal.
The group assigned to the endpoint.
The machine name of the endpoint.
A value that identifies the Windows operating system SID (Security Identifier). Webroot uses an algorithm to determine this value.
The IP address of the endpoint.
The license used to install SecureAnywhere on the endpoint.
The date and time the endpoint reported an infection.
Last Scan Time
The time of the last scan on this endpoint.
The date and time this endpoint last checked into the Management Portal.
The classification of the malware; for example: Trojan or System Monitor.
The Message-Digest algorithm 5 value, which acts like a fingerprint to uniquely identify a file.
The operating system of the endpoint.
The directory or folder where the file was detected.
The policy assigned to the endpoint.
The name of the product associated with the file, if SecureAnywhere can determine that information.
The type of scan:
- Deep Scan
- Post Cleanup Scan
- Custom/Right-Click Scan
The current status of the endpoint:
- Protected — No infections.
- Infected — Malware detected.
- Not Seen Recently — Has not reported into the portal.
- Expired — SecureAnywhere license has lapsed.
- Infected & Expired
The number of the service pack for the operating system.
Either 32-bit or 64-bit.
The name of the vendor associated with the file, if SecureAnywhere can determine that information.
The version of the product associated with the file, if SecureAnywhere can determine that information.
Yes, if the endpoint is installed on a virtual machine.
Windows Full OS
The name of the Windows operating system.