How to find this feature:
Main Console > Overview > Security Reports (click the bar
graph icon or the threats stopped in
the past month link) > View detailed
logs
You can take a look at how you have been protected in detail by selecting the type of log data you want to view.
Log Type | Description | Available In |
Last Scan | Shows detailed results of the most recent scan, and what was done in response to the threats found |
|
Viruses | Shows the viruses, worms, and similar threats found, and the actions taken against them |
|
Spyware | Shows suspected spyware programs found, and the actions taken against them |
|
Browser Cookies | Shows security threats found among your web browser cookies, and the actions taken against them |
|
Web Threats | Shows the address (URL) of each website that has been blocked because it could pose a security risk |
|
Unauthorized Change Prevention | Shows the files, resources, and processes involved in attempts to make unusual changes to the computer settings (such attempts often indicate the presence of malicious software) |
|
Data Theft Prevention | Shows the categories of items of protected information that have been intercepted |
|
Network | Shows the source and destination of online threats found, identified by the IP address (every device connected to a network has an IP address) |
|
Updates |
Shows which components of the program have been updated recently You cannot delete these write-protected logs. |
|
Parental Controls | Shows the addresses of websites blocked by Parental Controls |
|
Secure Erase | Shows the files deleted by Quick Erase or Permanent Erase |
|
System Tuner | Shows the items modified by System Tuner |
|
WIFI Advisor | Shows access points (wireless networks) recognized as risky or dangerous |
|
You must activate some features (like System Tuner or Parental Controls) before seeing any reports or log data from them. |
---|
What happens when a threat is detected?
In general, the security software will try to remove threats founds, either by cleaning the file involved or deleting it if necessary. However, you might see any of the following descriptions under Response:
Response | Description |
Cleaned | A threat has been removed from a file, making it safe. |
Removed | The file containing the threat or the suspected spyware program has been deleted. |
Restored | You allowed an infected file or suspected spyware program to go back to its original location on the computer. |
Access Denied | The file containing the threat resides in a place where your security software cannot make changes, like a CD-ROM or a folder with access restrictions. |
Restart Required | You should restart your computer to finish cleaning or deleting an infected file. |
Click Export in the top right corner of the window to save the displayed log as comma-separated values (CSV) file (text with each of the fields separated by a comma). You can use a CSV file to print the log, or open it with a spreadsheet program.