View and analyze logs about bandwidth consumption, how policies control
traffic, which sites users access, and whether scan engines protect users from malware,
network threats, and other potential harm.
|
Note
To view detailed log information, including examples, see Detailed Logs.
|