Explore threats on a device
(Updated: )As part of the threat and compliance monitoring within CleanMyMac Business, you can review all threats found on a device enrolled in your Organization. This can help you plan and take the right actions to manage and mitigate security risks.
To inspect threats on a device:
Sign in to your Owner or Admin account in the Admin Dashboard, then go to Devices.
The list of all devices in your Organization opens.
Find the device you're interested in and click its entry.
Devices with detected threats have a special label under their names—Malware.
The device page opens.
Review the threats on the device:
On the Overview tab, see the Identified Issues section for the summary of detected threats:
Number and types of threats detected
Criticality level for the device health (Critical, Warning, or Low Importance)
Impact on the device health (in percentage)
On the Threats tab, view the detailed information about each threat:
Threat name
Threat type
Threat status: Found or Deleted
Threat severity: High, Medium, or Low
Discovery and removal timestamps
Threat identifier
Files associated with the threat: Names, hashes, sizes, and statuses (On device or Deleted)