When Mobile Device
Agents generate a malware protection log, Web threat protection log, policy violation
log or an event log, the log is sent to the
Mobile Security server. This enables Mobile Device Agent logs to be stored on a
central location so you can assess your organization's protection policies and identify
mobile devices at a higher risk of infection or attack.
|
Note
You can view SMS anti-spam,
WAP-push protection, and call filtering logs on the mobile devices.
|