Date and time of security risk detection
Endpoint with security risk
Security risk name
Security risk source
Scan type that detected the security risk
Scan results, which indicate whether scan actions were performed successfully. For details about scan results, see Scan Results.
To keep the size of logs from occupying too much space on the hard disk, manually delete logs or configure a log deletion schedule. For more information about managing logs, see Managing Logs.