Skip to content

Detections

The Detections page shows threats detected on the computer.

You may not have all the features described here. This depends on your license.

The upper part of the page shows whether there are any detections to deal with.

No malware or PUAs outstanding indicates that there are no detections or that any detections have been cleaned up.

Click Scan to scan the computer for threats now.

Detections status.

Detection history

Malware and PUA Event history shows details of malware and PUAs.

The Detection history shows statistics for each type of threat detected. Click any threat type to see a list of detection events of that type on the Events page.

Detections page.

Detection types

Here are details of the types of threats and unwanted items.

Detection type Description
Malware and PUAs Malware is a general term for malicious software. It includes viruses, worms, Trojans and spyware.

Potentially Unwanted Applications (PUA) are programs that aren't malicious by design but are potentially unsuitable for business environments. For example, they may introduce privacy, security, or user experience risks within an organization's environment. Customers can allow PUAs in their environment based on their business needs.
Web threats

Web threats include malicious websites, uncategorized websites, and risky downloads.

Some websites are also generally considered unsuitable for business networks, for example adult websites or social media. These can be blocked.

Malicious behavior

Malicious behavior is suspicious behavior detected in software that is already running on the computer or server.

This detection type is only for Windows.

Ransomware Ransomware is malicious software that denies you access to your files until you pay a ransom.
Controlled Items

This category includes:

  • Applications that are not a security threat, but that you decide are unsuitable for use in the office.
  • Peripherals and removable media.
  • Risky downloads or websites that are inappropriate for the office.
  • Files containing sensitive information (like personal or financial details) that you don't want to leak.
Malicious Traffic Malicious traffic is traffic between computers that indicates a possible attempt to take control of the computer or server (a “command and control” attack).
Exploits

Exploits that Sophos can prevent include application hijacking and exploits that take advantage of vulnerabilities in browsers, browser plug-ins, Java applications, media applications and Microsoft Office applications.

This detection type is only for Windows.