Procedure
- Go to one of the following:
-
- In the agent tree, click the root domain icon () to include all agents or select specific domains or agents.
- Go to the Spyware/Grayware Log Criteria
screen:
-
From the Security Risk Logs screen, click.
-
From the Agent Management screen, click.
-
- Specify the log criteria and then click Display Logs.
- View logs. Logs contain the following information:ItemDescriptionDate/TimeThe time the detection occurredEndpointThe endpoint on which the detection occurredSpyware/GraywareThe name of the security threatScan TypeThe scan that detected the threatResultThe result of the action taken
Note
For more information on scan results, see Spyware/Grayware Scan Results.IP AddressThe IP address and port number of the source endpointMAC AddressThe MAC address of the infected endpointDetailsA link that displays the detailed analysis for the specific detection - (Optional) Select any spyware/grayware detection you consider harmless and click Add to Approved List to exclude the program from further scanning.
- To save logs to a comma-separated value (CSV) file, click
Export All to CSV. Open the file or save it to a
specific location.The CSV file contains the following information:
-
All information in the logs
-
User name logged on to the endpoint at the time of detection
-