Viewing Infected Devices

In the Infected Devices page you can see information about infected devices and servers in the internal networks. You can also directly create an exception rule for a specified protection related to an infected or possibly infected device or server.

You can access this page from the Threat Prevention tab > Threat Prevention section, or from the Logs and Monitoring tab > Status section.

The Infected Devices table shows this information for each entry: