Inspect threats across all devices

(Updated: )

CleanMyMac Business lets Owners and Admins monitor threats found on devices enrolled in your Organization.

To review threats across your Organization:

  1. Sign in to your Owner or Admin account in the Admin Dashboard.

  2. Go to Security > Threats.

Here, you can see detailed information about each identified threat. You can filter threats to show only those identified today or for the last 30 days.

The threat details include:

  • Threat name

  • Threat type:

    • Adware: Displays unwanted ads, often to trick users into buying products or services.

    • Backdoor: Allows unauthorized access to a user's Mac.

    • Botnet: Turns Mac into part of a bot network controlled by external commands.

    • Dropper: Installs additional malware, typically disguised as legitimate software.

    • Exploit: Takes advantage of system vulnerabilities to gain unauthorized access, often used to steal data or cause harm.

    • Installer: Installs other software, sometimes for malicious purposes.

    • Keylogger: Collects keystrokes, potentially stealing passwords, credit card numbers, and sensitive information.

    • Miner: Uses the system's processing power to mine cryptocurrency without the user's knowledge, slowing down their Mac.

    • PUA: Potentially unwanted applications, often exhibiting unwanted behavior even if installed intentionally.

    • Ransomware: Blocks access to user data or system until ransom is paid.

    • Riskware: Legitimate software that could be exploited for malicious purposes.

    • Rootkit: Grants unauthorized users administrative access to the system.

    • Spyware: Collects data from the system without the user's knowledge and sends it to unknown entities.

    • Stealer: Steals sensitive data, such as login credentials or financial information, without user's consent.

    • Trojan: Disguises itself as legitimate software to gain unauthorized access or control of the system.

    • Virus: Infects other programs, replicating itself and modifying functionality.

    • Worm: Spreads across networks, replicating itself and infecting other systems.

    • Other: Undefined malicious software that should still be removed for security reasons.

  • Threat status: Found or Deleted

  • Device where the threat was found: name, model, and associated member email

  • Threat severity: High, Medium, or Low

  • Discovery and removal (if so) timestamps

  • Threat identifier

  • Files associated with the threat: names, hashes, sizes, and statuses (On device or Deleted)

By reviewing this information, you can take appropriate action to manage and mitigate security risks in your Organization.

Was this article helpful?

Help us improve Knowledge Base

Related Articles

Contact us

Can’t find answers to your question?

Contact us and we’ll get back to you as soon as we can.

Contact us