Trend Micro™ Network VirusWall™ Enforcer 2500 Administrator’s Guide
4
-
4
Viewing the Network Virus Log
When the device detects a virus or security violation, it creates a Network Virus Log
entry. If you register the device to Control Manager, entries from this log send to the
Control Manager server immediately.
View the Network Virus log from the Web console. Click
Logs
>
Network Virus
Log
to view the log or export the log by clicking
Export
from the
Network Virus
Log
screen. The Network Virus Log displays the Date/Time, IP Address, Hostname,
MAC Address Network Virus Name, Scan Action, Engine Version, and Pattern
Version.
Endpoint History
When the device detects endpoints, detects violations, or quarantines a endpoint, it
creates a Endpoint History entry. If you register the device to Control Manager,
configure the time interval to send the Endpoint History to the Control Manager
server from
Log Settings
.
View the Endpoint History from the Web console. Click
Logs
>
Endpoint History
.
Select from three different lists:
Compliant
,
Violation
, and
Quarantine
or click
Export All
to save the information to a file.
Configuring Log Settings
Use log settings to send logs to a Control Manager server or syslog servers. Click
Logs > Log Settings
to configure log settings. From the log settings screen, you can:
•
Enable hostname resolution
.
•
Select
Send logs to the Control Manager server
and specify the time interval in
hours to send the Endpoint History log to Control Manager.
•
Select
Send logs to the primary syslog server
to manage logs from a syslog
application.
•
Select
Send logs to the secondary syslog server
to manage logs on a backup or
duplicate syslog application.
LCD Module Log Format and Interpretation
Logs displayed on the LCD console fall into the following categories: