View and Search Threat Logs
To view the Threat Logs for an account, on the Overview page, click Manage for that account, then do the following:
- On the Accounts page, click Threat Logs in the left navigation menu.
- In the search box at the top, enter an endpoint name, a filename, or leave the search box empty to view all threat logs for the account for the selected date range.
Threats identified by the service are logged by:
- Endpoint Name
- Scan Determination – Suspicious, Malicious or Encrypted. For handling of encrypted or password-protected files, see How to Set Threat Policies.
Click on the Report icon in the View column to download a scan report showing file metadata, threat analysis, and other details about the file.
To change the date range of the display, select Last 7 days, Last 30 days or Last 24 Hours from the drop-down on the upper right of the page.
To change the Threat Logs view, select the number of rows to display using the Rows per page drop-down at the bottom of the display.
To export the logs, click Download CSV.