Using Logs

Endpoint Security activity is recorded in logs. Your administrator might use information from the logs for different reasons that include:

  • To identify the cause of technical problems.

  • To monitor Anti-Malware or VPN traffic.

  • To see if there is communication between your client and other machines that it needs to communicate with.

  • To make sure that all features function as necessary.

To see the logs go to the Endpoint Security Home Page > MenuAdvancedView Logs.

Using the Event Filter

The Event Filter allows you to filter the logs to see the information that applies to you. The filter is located in the Log Viewer window. To open, click View Logs. The filer is to the left of the logs.

You can filter by:

  • Event types - Select or clear the checkboxes that relate to the different Endpoint Security features. Only logs of events from the selected features are included in the results.

  • Time period - Select a Start date and time and an End date and time. Clear the Start or End options if you want to keep them empty.

  • Number of events - Select the maximum number of events to show in the results.

    • Show Newest or Oldest first - Select which logs must be at the top of the list.

Exporting Logs

If necessary to export the logs to a file to send to your administrator, follow these steps:

You can email this file to your administrator.