Inspect threats across all devices
(Updated: )CleanMyMac Business lets Owners and Admins monitor threats found on devices enrolled in your Organization.
To review threats across your Organization:
Sign in to your Owner or Admin account in the Admin Dashboard.
Go to Security > Threats.
Here, you can see detailed information about each identified threat. You can filter threats to view only the active ones (Active) or all threats recorded over time (Threats History).
The threat details include:
Threat name
Threat type:
Adware: Displays unwanted ads, often to trick users into buying products or services.
Backdoor: Allows unauthorized access to a user's Mac.
Botnet: Turns Mac into part of a bot network controlled by external commands.
Dropper: Installs additional malware, typically disguised as legitimate software.
Exploit: Takes advantage of system vulnerabilities to gain unauthorized access, often used to steal data or cause harm.
Installer: Installs other software, sometimes for malicious purposes.
Keylogger: Collects keystrokes, potentially stealing passwords, credit card numbers, and sensitive information.
Miner: Uses the system's processing power to mine cryptocurrency without the user's knowledge, slowing down their Mac.
PUA: Potentially unwanted applications, often exhibiting unwanted behavior even if installed intentionally.
Ransomware: Blocks access to user data or system until ransom is paid.
Riskware: Legitimate software that could be exploited for malicious purposes.
Rootkit: Grants unauthorized users administrative access to the system.
Spyware: Collects data from the system without the user's knowledge and sends it to unknown entities.
Stealer: Steals sensitive data, such as login credentials or financial information, without user's consent.
Trojan: Disguises itself as legitimate software to gain unauthorized access or control of the system.
Virus: Infects other programs, replicating itself and modifying functionality.
Worm: Spreads across networks, replicating itself and infecting other systems.
Other: Undefined malicious software that should still be removed for security reasons.
Threat status: Found or Deleted
Device where the threat was found: name, model, and associated user's email address
Threat severity: High, Medium, or Low
Discovery and removal (if so) timestamps
Threat identifier
Files associated with the threat: names, hashes, sizes, and statuses (On device or Deleted)
By reviewing this information, you can take appropriate action to manage and mitigate security risks in your Organization.