Report Details

How to find this feature:

Security Reports > View detailed logs

You can take a look at how you have been protected in detail by selecting the type of log data you want to view.

Log Type Description Available In
Last Scan Shows detailed results of the most recent scan, and what was done in response to the threats found
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Viruses Shows the viruses, worms, and similar threats found, and the actions taken against them
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Spyware Shows suspected "spyware" programs found, and the actions taken against them
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Browser Cookies Shows security threats found among your web browser cookies, and the actions taken against them
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Web Threats Shows the address (URL) of each website that have been blocked because it could pose a security risk
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Unauthorized Change Prevention Shows the files, resources, and processes involved in attempts to make unusual changes to the computer settings (such attempts often indicate the presence of malicious software)
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Data Theft Prevention Shows the categories of items of protected information that have been intercepted
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Network Shows the source and destination of online threats found, identified by Internet Protocol address (every device connected to a network has an IP address)
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Updates Shows which components of the program have been updated recently
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Parental Controls Shows the addresses of websites blocked by the Parental Controls
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Secure Erase Shows the files deleted by Quick Erase or Permanent Erase
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
System Tuner Shows the items modified by the System Tuner
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
WIFI Advisor Shows access points (wireless networks) recognized as risky or dangerous
  • Trend Micro™ Titanium™ Maximum Security
You must activate some features (like the System Tuner or Parental Controls) before seeing any reports or log data from them.

What happens when a threat is detected?

In general, the security software will try to remove threats founds, either by cleaning the file involved or deleting it if necessary. You might see any of the following descriptions under Response, however.

  • Cleaned
    A threat has been removed from a file, making it safe.
  • Removed
    The file containing the threat or the suspected spyware program has been deleted.
  • Restored
    You allowed an infected file or suspected spyware program to go back to its original location on the computer.
  • Access Denied 
    The file containing the threat resides in a place where your security software cannot make changes, like a CD-ROM or a folder with access restrictions.
  • Restart required
    You should restart your computer to finish cleaning or deleting an infected file.
     

Click Export in the top right corner of the window to save the displayed log as a comma-separated  value (CSV) file (text with each of the fields separated by a comma). You can use a CSV file to print the log, or open it with a spreadsheet program.

Tutorials and Help