Views:
The Security Agent generates logs when it detects files in the Suspicious File list and sends the logs to the server.

Procedure

  1. Go to one of the following:
    • LogsAgentsSecurity Risks
    • AgentsAgent Management
  2. In the agent tree, click the root domain icon (icon-root.jpg) to include all agents or select specific domains or agents.
  3. Click LogsSuspicious File Logs or View LogsSuspicious File Logs.
  4. Specify the log criteria and then click Display Logs.
  5. View logs. Logs contain the following information:
    • Date and time of suspicious file detection
    • Endpoint
    • Domain
    • Infection source SHA-1 hash value of the file
    • Path of the file
    • Scan type that detected the suspicious file
    • Scan results
      Note
      Note
      For more information on scan results, see Virus/Malware Scan Results.
    • IP address