Threat Emulation and Anti-Exploit
Endpoint Security Threat Emulation and Anti-Exploit detect zero-day and unknown attacks. Files on your computer are sent to a testing area for emulation to detect malicious files and content.
From the Endpoint Security Main Page, click Threat Emulation and Anti-Exploit to see options.
The status of Threat Emulation and Anti-Exploit is shown to the right of the name:
-
On - Function is normal.
-
Off - Disabled by the policy.
-
Initializing - In startup mode.
-
Warning - Low disk space.
-
Error - Very low disk space (stops sensors recording).
The Infections table shows incidents that Threat Emulation and Anti-Exploit detected. Click an incident's ID to open a report.