Internet Security Logs Parent topic

View and analyze how scan engines protect users from malware, network threats, and other potential harm. After reviewing the logs, enable or disable security features and adjust actions, schedules, or user policies to better protect the network.