Logs
Threat Discovery Appliance keeps comprehensive logs about security risk incidents, events, and updates. The log contains all the results of the assessment and the status of computers. These log entries are stored on the product’s hard disk.
You can store these logs in the Trend Micro Control Manager database or a Syslog server. You can also perform log queries to gather information and create reports from the log database.
Log types |
Type |
Description |
Information on potential and known threats, external attacks, and internal detections. |
|
Information on the application filter activities. |
|
Summaries of events regarding the product, such as component updates and product restarts. |
See also: