OfficeScan keeps comprehensive logs about security risk detections, events, and updates. Use these logs to assess your organization's protection policies and to identify clients at a higher risk of infection or attack. Also use these logs to check client-server connection and verify if component update was successful.
OfficeScan generates the following logs:
OfficeScan generates logs when it detects virus/malware and spyware/grayware, and when it restores spyware/grayware. For more information about security risk logs, see the following topics:
OfficeScan generates logs when it detects violations to firewall policies. For details, see Firewall Logs.
OfficeScan generates logs when it blocks known or potentially malicious Web sites. For details, see Web Reputation Logs.
OfficeScan generates connection verification logs to allow you to determine whether or not the OfficeScan server can communicate with all of its registered clients. For details, see Connection Verification Logs.
OfficeScan generates logs when the server and client perform component updates. View the logs to verify that OfficeScan successfully downloaded the components required to keep protection current. For more information about update logs, see the following topics:
OfficeScan generates logs when the client detects unauthorized access to devices connected to the client computer. Clients then send the logs to the server once per day. For details, see Device Control Logs.
OfficeScan generates system update logs to keep you informed about events that keep the OfficeScan server functioning properly, such as database backup and master service restart. For details, see System Event Logs.
Use debug logs to troubleshoot problems with the OfficeScan server and client. For more information about debug logs, see the following topics:
See also: