Purpose: View and analyze how scan engines protect users from malware, network
threats, and other potential harm. After reviewing the logs, enable or disable
security features and adjust actions, schedules, or user policies to better protect
the network.
Location: Analysis & Reports > LOG ANALYSIS > Internet Security
Procedure
- To analyze log data, select desired filtering options
including gateway groups, time period, the filter to group by, and top number of
detections.
Note
If there are more than 20 affected gateways, you must specify a gateway name to view the raw logs. - To save the current query for later analysis as a log favorite and a new report type, click Save at the top-right and then select Save As Favorite .
- To save the raw log query result, click Export To CSV in the raw log query result page, the upper limit of exporting is 5000 records.