You can select individual threats for details of that threat and actions taken by SonicWall Capture Client. You can also see the current status of the threat and in some instances, you are given a list of options for further actions, including Mark as In Progress, Mark as Resolved, Add to Exclusions, and Add to blacklist and so on.
If you click on a threat that was only detected, it shows a page as given below. Under the Actions section, you can see that the Threat has only been detected. It shows that the reason for non-prevention of the threat is because the policy is set to Detect (Alert only) threats. It does not Protect (Kill & Quarantine).
The Threat Indicators section displays the reasons for the engine to detect the incident. Indicators are generated based on analysis of the threat. The indicators display the behaviors the engine detected as malicious or suspicious. These include:
Abnormalities
Boot Configuration Update
Discovery
Evasion
Exploitation
Execution
General
Hiding/Stealthiness
Impersonation
InfoStealer
Injection
Lateral Movement
Malware
Packer
Persistence
Post Exploitation
Privilege Escalation
Process Injection
Ransomware
Reconnaissance
If the file looks like a legitimate file to your organization (custom app/script), then you can mark it as benign by clicking on More Actions and selecting Mark as benign.
If you create an exclusion for threats (More Actions > Add to Exclusions), the Analyst Verdict automatically changes to False Positive and the Status is set to Marked as Benign.