Threat Emulation and Anti-Exploit

Endpoint Security Threat Emulation and Anti-Exploit detect zero-day and unknown attacks. Files on your computer are sent to a testing area for emulation to detect malicious files and content.

From the Endpoint Security Main Page, click Threat Emulation and Anti-Exploit to see options.

The status of Threat Emulation and Anti-Exploit is shown to the right of the name:

  • On - Function is normal.

  • Off - Disabled by the policy.

  • Initializing - In startup mode.

  • Warning - Low disk space.

  • Error - Very low disk space (stops sensors recording).

The Infections table shows incidents that Threat Emulation and Anti-Exploit detected. Click an incident's ID to open a report.