Logs > Threat Event Logs
Run a query to find more or specific information about the endpoint threats or actions taken by Threat Mitigator.
Click Logs on the main menu. The drop-down menu displays.
Click Threat Event Logs from the drop-down menu. The Threat Event Logs screen displays.
Select a time period for the query:
By default, the All days option time period appears in the selection.
By default, the date and time of the most recent logs appear in the From and To fields. Accept the defaults or select beginning and ending dates from the drop-down menu or the From and To fields.
Select beginning and end dates from the From and To fields by clicking on the calendar icon next to each field () and the individual date. The date you clicked appears in the respective From or To field in the correct format.
Click the More search criteria link. Additional detailed input fields appear.
Refine your search by selecting any combination of the following:
IP address (or range)
Host name
Threat event
Data source
Select the number of logs per page that you want to display.
Click Search. A Query Result table appears.
Click Export to CSV.