PortalProtect provides
comprehensive information about various scans. It saves this information to a database.
You can
query the database and obtain logs for analysis. For example, you can analyze Security
Risk scan
logs to view the most common viruses and scan actions and see which users are introducing
viruses
to the network.
You can use this information to reduce system vulnerabilities and review the effectiveness
of
your security policies; then, if necessary, adjust the policies accordingly. Additionally,
you
can export the log data in
.csv
format for further analysis or to share the
information.The following is a listing of the information contained within the various log types:
-
Security risk scan logs–contains information about the: Date & Time, Violator, Security Risk Name, Action, File Name, and Location. You can filter the Security risk scan logs for:
-
All
-
Detected virus/malware
-
Uncleanable virus/malware
-
Detected spyware/grayware
-
-
File blocking logs–contains information about the: Date & Time, Violator, Policy Name, Action, File Name, Triggered File Type/Name, and Location.
-
Content Filtering logs–contains information about the: Date & Time, Violator, Policy Name, Action, File name/Web Content Title, Triggered Keywords, and Location.
-
Data loss prevention logs–contains information about the: Date & Time, Violator, Policy Name, Action, File Name/Web Content Title, Template(s), and Location.
-
Web reputation logs–contains information about the: Date & Time, Violator, Risk Level, Web Content Title, Suspicious URL, Action, and Location.
-
Update logs–contains information about the: Date & Time, and Description.
-
Scan events logs–contains information about the: Date & Time, and Description.
-
Backup logs–contains information about the: Date & Time, Violator, Security Rick Name, File Name, Location, and Backup Path.
-
Unscannable files logs–contains information about the: Date & Time, Location, Violator, Reason, File Name, and Action.
-
Event tracking logs–contains information about the: Username, Event time, IP address, Event type, Source type, and Description.