Report Details

Tip:

How to find this log:

Main Console > Overview > Security Report (click the bar graph icon or the threats stopped link) View detailed logs

You can take a look at how you have been protected in detail by selecting the type of log data you want to see.

Log Type

Description

Available In

Last Scan

Shows detailed results of the most recent scan, and what was done in response to the threats found

  • Trend Micro™ Titanium™ Antivirus+

  • Trend Micro™ Titanium™ Internet Security

  • Trend Micro™ Titanium™ Maximum Security

Viruses

Shows the viruses, worms, and similar threats found, and the actions taken against them

  • Trend Micro™ Titanium™ Antivirus+

  • Trend Micro™ Titanium™ Internet Security

  • Trend Micro™ Titanium™ Maximum Security

Spyware

Shows suspected spyware programs found, and the actions taken against them

  • Trend Micro™ Titanium™ Antivirus+

  • Trend Micro™ Titanium™ Internet Security

  • Trend Micro™ Titanium™ Maximum Security

Browser Cookies

Shows security threats found among your web browser cookies, and the actions taken against them

  • Trend Micro™ Titanium™ Antivirus+

  • Trend Micro™ Titanium™ Internet Security

  • Trend Micro™ Titanium™ Maximum Security

Web Threats

Shows the address (URL) of each website that has been blocked because it could pose a security risk

  • Trend Micro™ Titanium™ Antivirus+

  • Trend Micro™ Titanium™ Internet Security

  • Trend Micro™ Titanium™ Maximum Security

Unauthorized Changes

Shows the files, resources, and processes involved in attempts to make unusual changes to the computer settings (such attempts often indicate the presence of malicious software)

  • Trend Micro™ Titanium™ Antivirus+

  • Trend Micro™ Titanium™ Internet Security

  • Trend Micro™ Titanium™ Maximum Security

Data Theft Prevention

Shows the categories of items of protected information that have been intercepted

  • Trend Micro™ Titanium™ Internet Security

  • Trend Micro™ Titanium™ Maximum Security

Network

Shows the source and destination of online threats found, identified by the IP address (every device connected to a network has an IP address)

  • Trend Micro™ Titanium™ Internet Security

  • Trend Micro™ Titanium™ Maximum Security

Updates

Shows which components of the program have been updated recently

Note:

You cannot delete these write-protected logs.

  • Trend Micro™ Titanium™ Antivirus+

  • Trend Micro™ Titanium™ Internet Security

  • Trend Micro™ Titanium™ Maximum Security

Parental Controls

Shows the addresses of websites blocked by Parental Controls

  • Trend Micro™ Titanium™ Internet Security

  • Trend Micro™ Titanium™ Maximum Security

Secure Erase

Shows the files deleted by Quick Erase or Permanent Erase

  • Trend Micro™ Titanium™ Internet Security

  • Trend Micro™ Titanium™ Maximum Security

System Tuner

Shows the items modified by System Tuner

  • Trend Micro™ Titanium™ Internet Security

  • Trend Micro™ Titanium™ Maximum Security

WIFI Advisor

Shows access points (wireless networks) recognized as risky or dangerous

  • Trend Micro™ Titanium™ Antivirus+

  • Trend Micro™ Titanium™ Internet Security

  • Trend Micro™ Titanium™ Maximum Security

You must activate some features (like System Tuner or Parental Controls) before seeing any reports or log data from them.

What happens when a threat is detected?

In general, the security software will try to remove threats founds, either by cleaning the file involved or deleting it if necessary. However, you might see any of the following descriptions under Response:

Response

Description

Cleaned

A threat has been removed from a file, making it safe.

Removed

The file containing the threat or the suspected spyware program has been deleted.

Restored

You allowed an infected file or suspected spyware program to go back to its original location on the computer.

Access Denied

The file containing the threat resides in a place where your security software cannot make changes, like a CD-ROM or a folder with access restrictions.

Restart Required

You should restart your computer to finish cleaning or deleting an infected file.

Click Export in the top right corner of the window to save the displayed log as a comma-separated values (CSV) file (text with each of the fields separated by a comma). You can use a CSV file to print the log or open it with a spreadsheet program.