How Log Files are Named

IWSVA automatically logs all Internet-threat incidents, blocked or filtered URLs, mail deliveries, pattern file and other updates, and reports. Logs can be kept on the local IWSVA server, or posted to the IWSVA database (for faster reporting, file management considerations, or to aggregate data for a multi-IWSVA environment).

Naming convention

See also