To show or hide additional data about the recently infected endpoints in the bottom panel, click a column header to open the drop-down menu, then select checkboxes to add columns or deselect checkboxes to remove columns.
For additional information on any risks posed by threats and undetermined file types, click on any file name.
The system displays the File Intelligence view.
The various aspects of this view are described in the following table.
Hover the mouse over the determination to display agent, rule, and cloud informaiton.
Displays information on the first time (FS) the file has been seen by WIN and also its global popularity, that is, how much it has been seen by others.
Google Product/Vendor Links
Click the link to access additional information about the file. This can be useful when the admin is unsure about the classificaiton.
Click the button to override the file for white- or blacklisting purposes.
Displays how many times the file has been seen within the console and when.
Console Dwell Time
Displays how many times the file has been seen within the console and for how long.
Endpoint Dwell Time
Displays how long the file has been seen on the device in question.
For more details about threats and further options, you can generate the Endpoints with Threats on Last Scan report. From this report, you can change the endpoint's policy, run a scan, create an override for a file, or restore a file from quarantine. See Generating the Endpoints with Threats on Last Scan report.