Explore threats on a device
(Updated: )As part of the threat and compliance monitoring within CleanMyMac Business, you can review all threats found on a device enrolled in your Organization. This can help you plan and take the right actions to manage and mitigate security risks.
To inspect threats on a device:
- Sign in to your Owner or Admin account in the Admin Dashboard, then go to Devices. - The list of all devices in your Organization opens. 
- Find the device you're interested in and click its entry. Tip- Devices with detected threats have a special label under their names—Malware. - The device page opens. 
- Review the threats on the device: - On the Overview tab, inspect the Identified Issues section for the summary of detected threats: - Number and types of threats detected 
- Criticality level for the device health (Critical, Warning, or Low Importance) 
- Impact on the device health (in percentage) 
 
- On the Threats tab, check the detailed information about each threat: - Threat name 
- Threat status: Found or Deleted 
- Threat severity: High, Medium, or Low 
- Discovery and removal timestamps 
- Threat identifier 
- Files associated with the threat: names, hashes, sizes, and statuses (On device or Deleted) 
 - You can filter threats to view only the active ones (Active) or all threats recorded over time (Threats History).