About Logs Parent topic

Logs are time-sequential records of IM Security events. These events refer to actions initiated by either a user or the IM Security server. IM Security allows you to query unformatted logs or display them through reports.
Logs are stored in the IM Security database. To avoid information loss, carefully review logs before deleting.
Tip
Tip
Saving logs means abundant available information about the IM Security server's performance. However, it also means more disk space usage. It is important to balance the need for information with the available system resources.
From the product console, you can query any of the following logs:

Log Types

Log Type
Description
Virus Scan
Indicates the source of the infection or intrusion
File Blocking
Enumerates blocked files with matching File Blocking rules
Content Filtering for files logs
Enumerates files with matching Content Filtering rules
Content Filtering for IM logs
Enumerates messages with matching Content Filtering rules
Data Loss Prevention for files
Enumerates files that triggered Data Loss Prevention policies
Data Loss Prevention for IM
Enumerates messages that triggered Data Loss Prevention policies
Web Reputation for IM
Enumerates messages that contain web threats (malicious URL addresses)
Web Reputation for file
Enumerates files that contain web threats (malicious URL addresses)
Communication Control
Displays the contacts that triggered the Block action of a Communication Control policy
Update
Indicates the types of updates performed, including the result
Event tracking
Provides information about all console operations