Viewing Threat Event Logs

Logs > Threat Event Logs

Run a query to find more or specific information about the endpoint threats or actions taken by Threat Mitigator.

To query the logs:

  1. Click Logs on the main menu. The drop-down menu displays.

  2. Click Threat Event Logs from the drop-down menu. The Threat Event Logs screen displays.

  3. Select a time period for the query:

  1. Click the More search criteria link. Additional detailed input fields appear.

  2. Refine your search by selecting any combination of the following:

  3. IP address (or range)

  4. Host name

  5. Threat event

  6. Data source

  7. Mitigation status

  1. Select the number of logs per page that you want to display.

  2. Click Search. A Query Result table appears.

  3. Click Export to CSV.

See also: