When Mobile Device Agents generate event logs about
security risk detection, the logs are sent and stored on the Mobile
Security Management Module. Use these logs to assess your organization's
protection policies and identify mobile devices that face a higher
risk of infection or attack.
To keep the size of your Mobile Device Agent logs from occupying
too much space on your hard disk, delete the logs manually or configure Mobile Security administration
Web console to delete the logs automatically based on a schedule
in the Log Maintenance screen.