Report Details

How to find this feature:
Main Console > Overview > Security Reports (click the bar graph icon or the threats stopped in the past month  link) > View detailed logs

You can take a look at how you have been protected in detail by selecting the type of log data you want to view.

Log Type Description Available In
Last Scan Shows detailed results of the most recent scan, and what was done in response to the threats found
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Viruses Shows the viruses, worms, and similar threats found, and the actions taken against them
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Spyware Shows suspected spyware programs found, and the actions taken against them
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Browser Cookies Shows security threats found among your web browser cookies, and the actions taken against them
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Web Threats Shows the address (URL) of each website that has been blocked because it could pose a security risk
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Unauthorized Change Prevention Shows the files, resources, and processes involved in attempts to make unusual changes to the computer settings (such attempts often indicate the presence of malicious software)
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Data Theft Prevention Shows the categories of items of protected information that have been intercepted
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Network Shows the source and destination of online threats found, identified by the IP address (every device connected to a network has an IP address)
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Updates

Shows which components of the program have been updated recently

You cannot delete these write-protected logs.

  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Parental Controls Shows the addresses of websites blocked by Parental Controls
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
Secure Erase Shows the files deleted by Quick Erase or Permanent Erase
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
System Tuner Shows the items modified by System Tuner
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
WIFI Advisor Shows access points (wireless networks) recognized as risky or dangerous
  • Trend Micro™ Titanium™
  • Trend Micro™ Titanium™ Internet Security
  • Trend Micro™ Titanium™ Maximum Security
You must activate some features (like System Tuner or Parental Controls) before seeing any reports or log data from them.

What happens when a threat is detected?

In general, the security software will try to remove threats founds, either by cleaning the file involved or deleting it if necessary. However, you might see any of the following descriptions under Response:

Response Description
Cleaned A threat has been removed from a file, making it safe.
Removed The file containing the threat or the suspected spyware program has been deleted.
Restored You allowed an infected file or suspected spyware program to go back to its original location on the computer.
Access Denied The file containing the threat resides in a place where your security software cannot make changes, like a CD-ROM or a folder with access restrictions.
Restart Required You should restart your computer to finish cleaning or deleting an infected file.

Click Export in the top right corner of the window to save the displayed log as comma-separated values (CSV) file (text with each of the fields separated by a comma). You can use a CSV file to print the log, or open it with a spreadsheet program.

Tutorials and Help