Back=right mouse click.
Logs > Log Query > Cleanup Log
Logs include the name of the Internet threat, date and time of detection, the name and path of the infected file, action taken, User ID, and the means of detection (real-time scan, manual scan).
Check the Internet-based Trend Micro Virus Encyclopedia for a detailed description of any Internet threat IWSVA detects, including clean-up routines (if appropriate).
Time period—Display logs for current day, week, or month.
Range—Choose a start and end date to define the time period for which you want to view logs (inclusive). If logs from the start date are no longer on the server (or database), the earliest available logs will be displayed.
Malware cleaned—Select the type of Internet threat (viruses, worms, Trojans, password-protected files, compressed-file rule infraction). If more than one instance of the same type occurred, for example, the same virus was detected multiple times, all instances will be displayed.
Show connection failure events—Choose this option to list any clients that DCS (Damage Cleanup Services) server was unable to contact (and thus unable to clean).
Sort by—Choose the order in which you want IWSVA to group the logs: Malware, Date, IP address, Action, Type, or Subtype.
Export Logs and Reports to Excel
How are Log Files Named?
Important Log Notes