When
Mobile Device Agents generate a malware protection log, Web threat
protection log, firewall log, encryption log, policy violation log
or an event log, the log is sent to the
Mobile Security server. This
enables Mobile Device Agent logs to be stored on a central location
so you can assess your organization's protection policies and identify
mobile devices at a higher risk of infection or attack.
 |
Note
You can view SMS anti-spam,
WAP-push protection, and call filtering logs on the mobile devices.
|