The Virtual Machine Threat Scan report offers key data insights, threat detection statistics, scan metadata, and backup trends for administrators and security teams.
When you identify an affected virtual server from the report, you can take several response actions that are available:
-
Delete Anomaly: If you determine that the threat indicator is a known or benign anomaly, you can choose to delete it.
-
Manage Tags: You can assign tags to anomalies for easier classification or internal reference. Tagging helps in organizing or tracking anomalies based on user-defined criteria.
-
Recover VM: If the virtual machine is confirmed to be infected, you can recover it from a known safe restore point. This option is typically used when the infection is caused by external threats.