Cleanup Log

Logs > Log Query > Cleanup Log

Logs include the name of the Internet threat, date and time of detection, the name and path of the infected file, action taken, User ID, and the means of detection (real-time scan, manual scan).

Check the Internet-based Trend Micro Virus Encyclopedia for a detailed description of any Internet threat IWSVA detects, including clean-up routines (if appropriate).

See also