Inspect threats across all devices
(Updated: )CleanMyMac Business lets Owners and Admins monitor threats found on devices enrolled in your Organization.
To review threats across your Organization:
Sign in to your Owner or Admin account in the Admin Dashboard.
Go to Security > Threats.
Here, you can see detailed information about each identified threat. You can filter threats to show only those identified today or for the last 30 days.
The threat details include:
Threat name
Threat type:
Adware: Displays unwanted ads, often to trick users into buying products or services.
Backdoor: Allows unauthorized access to a user's Mac.
Botnet: Turns Mac into part of a bot network controlled by external commands.
Dropper: Installs additional malware, typically disguised as legitimate software.
Exploit: Takes advantage of system vulnerabilities to gain unauthorized access, often used to steal data or cause harm.
Installer: Installs other software, sometimes for malicious purposes.
Keylogger: Collects keystrokes, potentially stealing passwords, credit card numbers, and sensitive information.
Miner: Uses the system's processing power to mine cryptocurrency without the user's knowledge, slowing down their Mac.
PUA: Potentially unwanted applications, often exhibiting unwanted behavior even if installed intentionally.
Ransomware: Blocks access to user data or system until ransom is paid.
Riskware: Legitimate software that could be exploited for malicious purposes.
Rootkit: Grants unauthorized users administrative access to the system.
Spyware: Collects data from the system without the user's knowledge and sends it to unknown entities.
Stealer: Steals sensitive data, such as login credentials or financial information, without user's consent.
Trojan: Disguises itself as legitimate software to gain unauthorized access or control of the system.
Virus: Infects other programs, replicating itself and modifying functionality.
Worm: Spreads across networks, replicating itself and infecting other systems.
Other: Undefined malicious software that should still be removed for security reasons.
Threat status: Found or Deleted
Device where the threat was found: name, model, and associated member email
Threat severity: High, Medium, or Low
Discovery and removal (if so) timestamps
Threat identifier
Files associated with the threat: names, hashes, sizes, and statuses (On device or Deleted)
By reviewing this information, you can take appropriate action to manage and mitigate security risks in your Organization.