Data related to the following features is stored and can be viewed
in logs:
-
Virus/Malware
-
Spyware/Grayware
-
Firewall
-
Web Reputation
-
Behavior Monitoring
-
Device Control
-
Suspicious Connection
-
Suspicious Files
-
Data Loss Prevention
-
C&C Callback
-
Scan Operation