Threat Event Logs

Logs > Threat Event Logs

Threat Mitigator creates a threat event log entry when performing mitigation actions.

You can do the following from the Threat Event Logs screen:

A brief description of the options on this screen is available below.

See also: