Reviewing Threat dashboard
The Threat page provides information on malware that is detected in motion or within cloud repositories.
You can access the Threat page by navigating to Threat page contains two individual dashboards, that is Data in Motion and Data at Rest.
. TheThe dashboards display information for last 7 days, by default. The dashboard maintains a record of log information for the past 60 days. You can select the Start Time and End Time and then click Apply to filter the information based on the selected time range. The End Time can be any date prior to today’s date.