Comodo Help
Find the desired product help
Comodo Secure Box

Comodo Secure Box

SecureBox Management Console Admin Guide

English

Print Help Download Help
Reports > Threats Report
  • Introduction To Comodo SecureBox
    • Initial Setup
    • Quick Start
    • Login To The Management Console
  • The Central Management Console
  • The Home Screen
  • Manage Organizations
    • Add A New Organization
    • Edit And Deactivate An Organization
  • Users And User Groups
    • Manage Users
    • Manage User Groups
  • Endpoints And Endpoint Groups
    • Manage Endpoints
      • Enroll Endpoints For Management
      • Assign Endpoints To Groups
      • Quarantine Endpoints
      • Delete Endpoints
    • Manage Endpoint Groups
      • Create A New Endpoint Group
      • Edit Endpoint Groups
  • Policies
    • Manage Policies
      • Create A New Policy
      • Edit A Policy
  • Configure The Management Console
  • Reports
    • Threats Report
    • Activity Report
  • License Information
  • Management Console Details And Support
  • About Comodo Security Solutions

Threats Report


The 'Threats Report' interface provides a comprehensive report of threats that were encountered by the secure applications. The details include the name of the endpoint and its ID assigned by the management console, the details of secure applications, when the CSB was installed and more. The report for the threat categories generated here for the computer groups depends on the settings configured in the log filter section of the computer group properties dialog. The available threat categories are:
  • Fake Certificate
  • Remote Detected
  • Malware Terminated
The logs for the selected threat categories will be received by the management console and saved into database. Reports can be generated for different time periods and the data will be fetched from the database. Report data will be empty if a threat category was disabled in log filter for the selected report generation period. For example, if you had disabled 'Fake Certificate' last week, no data for this category will be available in the generated report for the period last week. However, data will available in the generated reports for other time periods when the category was in enabled status.





Threat Report – Table of Column Description

Column

Description

Date

The date and time of threat recorded on the endpoint

Group

The computer group to which the endpoint belongs. Refer to the section 'Managing Endpoint Groups' for more details.

Computer

The name of the endpoint that was detected by CSB on enrollment. Refer to the section 'Enrolling Endpoints for Management' for more details.

Endpoint

The ID for the endpoint assigned by CSB on enrollment.

Threat Name

The application name which is detected as a threat, for example, AKLT.exe, Windows Remote Desktop and so on.

Malware Name

The malware name, which is the result of FLS scan. But not every threat log has the Malware name, for example, remote detect is a threat log but it has no malware name.

Threat Category

The category of the threat that was recorded on the enrolled endpoints:

  • Malware Terminated – A malware was detected and terminated by CSB
  • Remote Detected – Remote attempt was detected on the endpoint
  • Fake Certificate – An invalid certificate is detected when endpoint browses a website

For configuring the threat email notifications, the name of the threat category should be provided in the 'Category' row in the 'Preferences' interface > 'Threat Notifications' > 'Add New' button. Refer to the section 'Configuring the Management Console' for more details.

SecureBox Version

The details of the CSB version that is installed on the endpoints.

Installation Date

The date and time when the CSB was installed on the endpoints

Secure App

The name of the secure application for which the threat was recorded.

OS Version

The details of the endpoint's operating system

 SHA 1
 The SHA1 value of the secure application.


Sorting, filtering and searching options


Sorting the entries


Clicking any column heading sorts the entries based on the ascending/descending order of the entries as per the information displayed in the respective column.


Using the filter option


The threat report can be filtered using the date range and can be further filtered by providing the 'From' and 'To' dates. Please note the availability of past reports (up to one year) depends on the settings configured in 'Report Settings' from the 'Preferences' screen. 

  • Click the 'Date Range' drop-down box.




By default, 'Week' will be selected for the date range and the dates in the 'From' and 'To' will be for the last 7 days and the results displayed.

  • To refine the search further, provide the 'From' and 'To' dates by clicking on the combo boxes and selecting the dates from the calendar.




The results will be displayed per the dates and the date range selected. For example, if the selected date range is 'Week', the results will be displayed for 7 days or less according to the dates selected.

To export the report

CMC allows administrators to save the generated threat report to your system.
  • Click the 'Export' button (currently only .xls format is supported)



You can choose to save the file or open with any spreadsheet application.



  • Click 'OK'

The file will be saved in your default download location.

Using the search option

  • Enter the search details of items under any of the columns in the box fully or partially.

The search will begin automatically and results displayed.


Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • Managed IT Support Services
  • Free EDR
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2025. All rights reserved.