When Mobile Device Agents generate event logs about
security risk detection, the logs are sent and stored on the Mobile
Security Management Module. Use these logs to assess your organization's
protection policies and identify mobile devices that face a higher
risk of infection or attack.
To keep the size of your Mobile Device Agent logs from occupying too much space on
your hard
disk, delete the logs manually or configure Mobile Security administration web console to delete the logs automatically based
on a schedule in the Log Maintenance screen.