Reviewing Threat dashboard

The Threat page provides information on malware that is detected in motion or within cloud repositories.

You can access the Threat page by navigating to Analyze > Dashboard > Threat. The Threat page contains two individual dashboards, that is Data in Motion and Data at Rest.

The dashboards display information for last 7 days, by default. The dashboard maintains a record of log information for the past 60 days. You can select the Start Time and End Time and then click Apply to filter the information based on the selected time range. The End Time can be any date prior to today’s date.