Contents
Index
Search
Search Knowledge Base
Collapse All
Expand All
Previous
Next
Search
Toggle Highlight
Internet Security Logs
View and analyze how scan engines protect users from malware, network threats, and other potential harm. After reviewing the logs, enable or disable security features and adjust actions, schedules, or user policies to better protect the network.