Threats

Threats are instances of malware that have been detected on endpoints and are uniquely identified by their ThreatID. You can access threats logging information using the following database views:

  • vThreatInstances lists the threats that have been detected on each computer.
  • vThreatEventData provides a list of actions that have been performed in response to threats detected on the network.