Viewing the Threat Mitigation Log

Logs > Threat Mitigation Log

When the device attempts to respond to a detection by Threat Discovery Appliance (TDA), it generates an entry in the threat mitigation logs. If you register the device to Control Manager, it automatically sends threat mitigation log entries to the Control Manager server. The threat mitigation log displays the following information:

To view the threat mitigation log:

  1. Click Logs in the side bar. The drop-down menu displays.

  2. Click Threat Mitigation Log from the drop-down menu. The Threat Mitigation Log screen displays.

Exporting the Threat Mitigation Log

You can export the threat mitigation log from the web console to a CSV file.

To export the threat mitigation log:

  1. Click Logs in the side bar. The drop-down menu displays.

  2. Click Threat Mitigation Log from the drop-down menu.

  3. Click Export All to CSV.

  4. Note: The exported CSV contains all log entries that are listed in the table. Use the search criteria to narrow down the list.

See also:

About Logs

About Threat Mitigation

Threat Mitigation Log