Explore threats on a device

(Updated: )

As part of the threat and compliance monitoring within CleanMyMac Business, you can review all threats found on a device enrolled in your Organization. This can help you plan and take the right actions to manage and mitigate security risks.

To inspect threats on a device:

  1. Sign in to your Owner or Admin account in the Admin Dashboard, then go to Devices.

    The list of all devices in your Organization opens.

  2. Find the device you're interested in and click its entry.

    Tip

    Devices with detected threats have a special label under their names—Malware.

    The device page opens.

  3. Review the threats on the device:

    • On the Overview tab, see the Identified Issues section for the summary of detected threats:

      • Number and types of threats detected

      • Criticality level for the device health (Critical, Warning, or Low Importance)

      • Impact on the device health (in percentage)

    • On the Threats tab, view the detailed information about each threat:

      • Threat name

      • Threat type

      • Threat status: Found or Deleted

      • Threat severity: High, Medium, or Low

      • Discovery and removal timestamps

      • Threat identifier

      • Files associated with the threat: Names, hashes, sizes, and statuses (On device or Deleted)

Was this article helpful?

Help us improve Knowledge Base

Related Articles

Contact us

Can’t find answers to your question?

Contact us and we’ll get back to you as soon as we can.

Contact us