Back=right mouse click.
Logs > Log Query > Virus Log
Logs include the name of the Internet threat, date and time of detection, the name and path of the infected file, action taken, User ID, and the means of detection (real-time scan, manual scan).
Check the Trend Micro Virus Encyclopedia for a detailed description of any Internet threat IWSVA detects, including clean-up routines (if appropriate).
Time period—Display logs for current day, week, or month.
Range—Choose a start and end date to define the time period for which you want to view logs (inclusive). If logs from the start date are no longer on the server (or database), the earliest available logs will be displayed.
Viruses—Select the type of Internet threat (viruses, worms, Trojans, password-protected files, compressed-file rule infraction). If more than one instance of the same type occurred, for example, the same virus was detected multiple times, all instances will be displayed.
Protocol—Select the protocol type(s) for which you want to view logs.
Sort by—Choose the order in which you want IWSVA to group the logs:
Virus—The name of the detected virus, worm, Trojan, and so on
Date—The date and time of the request
Action—The action taken: clean, delete, quarantine, pass
Scan Type—FTP scanning, HTTP scanning, and so on
File Name—The name of the infected file, or the name of the Trojan file
User ID—The user whose Internet download or upload contained the threat; Note, depends on the method of User ID selected in Administration > IWSVA Configuration > User Identification | User Identification
Protocol—The protocol type used for the connection
Export Logs and Reports to Excel
How are Log Files Named?
Important Log Notes