Procedure
- Go to one of the following:
-
- In the agent tree, click the root domain icon () to include all agents or select specific domains or agents.
- Go to the Virus/Malware Log Criteria
screen:
-
From the Security Risk Logs screen, click.
-
From the Agent Management screen, click.
-
- Specify the log criteria and then click Display Logs.
- View logs. Logs contain the following information:ItemDescriptionDate/TimeThe time the detection occurredEndpointThe endpoint on which the detection occurredSecurity ThreatThe name of the security threatInfection ChannelThe channel the threat originated fromInfected File/ObjectThe location of the file/object on the endpointScan TypeThe scan that detected the threatResultThe result of the action taken
Note
For more information on scan results, see Virus/Malware Scan Results.IP AddressThe IP address and port number of the source endpointMAC AddressThe MAC address of the infected endpointDetailsA link that displays the detailed analysis for the specific detection - To save logs to a comma-separated value (CSV) file, click
Export All to CSV. Open the file or save it to a
specific location.The CSV file contains the following information:
-
All information in the logs
-
User name logged on to the endpoint at the time of detection
-