After
Deep Edge is installed and configured,
security risks are detected and acted upon according to the settings for each risk
type. These
events are recorded in the logs. Log query parameters vary slightly between log types.
Log
settings for enabling logs, log retention duration, and syslog forwarding are configurable.