Purpose: View and analyze how scan engines protect users from malware, network threats, and other potential harm. After reviewing the logs, enable or disable security features and adjust actions, schedules, or user policies to better protect the network.
Location: Analysis & Reports > LOG ANALYSIS > Internet Security

Procedure

  1. To analyze log data, select desired filtering options including gateway groups, time period, the filter to group by, and top number of detections.
    Note
    Note
    If there are more than 20 affected gateways, you must specify a gateway name to view the raw logs.
  2. To save the current query for later analysis as a log favorite and a new report type, click Save at the top-right and then select Save As Favorite .
  3. To save the raw log query result, click Export To CSV in the raw log query result page, the upper limit of exporting is 5000 records.