Viewing and Maintaining Logs Parent topic

When Mobile Device Agents generate a malware protection log, Web threat protection log, policy violation log or an event log, the log is sent to the Mobile Security server. This enables Mobile Device Agent logs to be stored on a central location so you can assess your organization's protection policies and identify mobile devices at a higher risk of infection or attack.
Note
Note
You can view SMS anti-spam, WAP-push protection, and call filtering logs on the mobile devices.