Logs > Threat Event Logs
Threat Mitigator creates a threat event log entry when performing mitigation actions.
You can do the following from the Threat Event Logs screen:
View the threat event logs
Export the logs to a .CSV file.
Perform rollback to restore files, registry keys, and other changes performed by a mitigation action
A brief description of the options on this screen is available below.
Time
period
Range
IP
address
Host
name
Threat
event
Data
source
Mitigation
Status
All
Mitigation
in progress
No
mitigation
Cleaned
threats
Scanned
endpoint
Assessed
endpoint
Unsuccessful
Rollback
successful
Rollback
unsuccessful
For more information, refer to Mitigation Status.
Logs
per page
Export
to CSV
Rollback