Deep Edge detects and acts upon security risks according to
the policy settings affecting each risk type. These events are recorded in the logs.
Log
query parameters vary slightly between log types. Log settings for enabling logs,
log
retention duration, and syslog forwarding are configurable.
Device logs include auditing when an administrator logs on to
Deep Edge, system events, and VPN connections. For more
information about analyzing device logs, see
Device Logs.