Open CCS > click 'Tasks' > 'Advanced Tasks' > 'View Logs'
Use the following links to jump to the task you need help with:
There are three ways to open the log viewer:
2. Click 'Tasks' on the CCS home screen then 'Advanced Tasks' > 'View Logs':
3. Right-click on the CCS tray icon then select 'View Logs':
The log dashboard shows a summary of events on the endpoint:
The controls the top lets you execute the following actions:
Antivirus logs contain stats about scanned objects, the settings used for each task, and a history of actions performed on individual files. Logs are recorded for real-time protection events, antivirus database updates and more.
Date & Time - When the event occurred.
Location - The installation path of the suspicious application
Malware Name - The malicious item that was detected
Action - How the malware was handled by CCS.
Status - Whether the action taken was a success or failure
Alert - Click 'Related Alert' to view the notification generated by the event
Date & Time - When the event occurred.
Location - The installation path of the suspicious application
Malware Name - The malicious item that was detected
Action - How VirusScope handled the malware.
Status - Whether the action taken was a success or failure
Alert - Click 'Related Alert' to view the notification generated by the event
Activities - Click 'Related Alert' to view the notification generated by the event. An example is shown below:
Firewall events are created for various reasons. Reasons include when a process attempts a connection that breaks a firewall rule, or when there is a change in firewall settings.
Date & Time - When the event occurred.
Application - The name of the program or process that caused the event.
Action - How the firewall reacted to the connection attempt. For example, whether the attempt was allowed, blocked o r an alert displayed.
Direction - Whether the connection attempt was inbound or outbound.
Protocol - The connection method that the application attempted to use. This is usually TCP/IP, UDP or ICMP, which are the most heavily used networking protocols.
Source IP - The address of the host from which the connection attempt was made. For outbound connections, this is usually the IP address of your computer. For inbound connections, it is usually the IP address of the external server.
Source Port - The port number that the source host used to make the connection attempt
Destination IP - The address of the host to which the connection attempt was made. For inbound connections, this is usually the IP address of your computer.
Destination Port - The port number on the destination host which the source tried to connect to.
Alert - Click 'Related Alert' to view the notification generated by the event
Host intrusion prevention (HIPS) events are generated for various security reasons. These include changes in HIPS settings, or when an application tries to access a restricted area, or when an action contravenes your HIPS rulesets.
Date & Time - When the event occurred.
Application - The name of the program or process that caused the event.
Action - The activity of the application and how HIPS handled it
Target - Location of the file, COM interface or registry key accessed by the process.
Alert - Click 'Related Alert' to view the notification generated by the event
CCS records all actions taken by the containment module. Events that are recorded include:
Date & Time - When the event occurred.
Application - The installation path of the application that was run in the container
Rating - The reputation of the contained application. The trust rating can be 'Trusted', 'Unrecognized' or 'Malicious'. Unrecognized files are run in the container until such time as they can be classified as 'Trusted' or 'Malicious'.
Action - How the malware was handled by CCS. This is also the restriction level imposed on the application by the container.
Contained by - The CCS service, policy or user that placed the application in the container.
Alert - Click 'Related Alert' to view the notification generated by the event
Parent Process - The program which spawned the contained process.
Parent Process ID - The unique identifier that points to the process
Parent process hash - The SHA1 hash value of the program which spawned the contained process.
Website filter logs are a record of all sites blocked (or allowed) by CCS. The logs record all attempts made by users to access blocked or allowed websites.
Background Note: You can create filtering rules for specific users in 'Advanced Settings' > 'Website Filtering'. |
Date & Time - When the event occurred.
Website - The URL of the site that was blocked, or allowed.
Category - The genre of the website. Example categories include 'Shopping sites', 'Social Media', 'Boutiques' etc. You can manage categories in 'Advanced Settings' > 'Website Filtering'.
Action - How the filter reacted to the connection attempt. For example, whether the attempt was allowed, blocked or an alert shown to the user.
Device control logs record events related to external devices. External devices include USB, optical, and storage drives plugged into your computer.
Events logged include:
FYI - Admins can also configure device control in an Endpoint Manager profile. For example, if you want to allow unfettered access to certain devices you can (i) disable device control entirely (ii) remove the device class from the list of controlled types, or (iii) add specific devices to exclusions.
Date - When the event occurred.
Name - The type of device associated with the event.
Identifier - The identification string of the device
Class - The GUID (Globally Unique Identifier) string of the category of the device as defined by the Windows operating system.
State - Whether the device was allowed or blocked.
Autorun logs show events where changes were attempted on Windows services, auto-start entries and scheduled tasks.
Background: CCS monitors changes to registry items related to Windows Services, Autorun entries and scheduled tasks. You can define the response CCS should take against unrecognized autoruns in 'Advanced Settings' > 'Advanced Protection' > 'Miscellaneous'. You can also define the response to unknown autoruns found by an antivirus scan. |
Date & Time - When the event occurred.
Type - Whether the detected item is an autorun entry, Windows service, or scheduled task.
Location - The installation path of the affected item, or the location of the new item
Modifier - The location of the application that made the change.
Action - How CCS responded to the event.
Detected By - Place where the scan was executed and runned
Status - Whether the action taken was a success or failure
Alert logs are a record of all threat notifications generated by CCS, and also record the user's response to the alert.
Date & Time - When the event occurred.
Alert Type - The security module that generated the alert. Alert types include antivirus, firewall, HIPS, containment, VirusScope and secure shopping.
Description - Name of the file or event that caused the alert.
Advice -The recommendation, or informational text in the alert. This text is intended to help users decide to respond to the threat.
Answered - Whether or not the alert was answered by the user. You will see the date and time of the response if an answer was provided.
Answer - The user's response to the alert. For example, 'Allow', 'Block', 'Disinfect', 'Skip'.
Option - Additional settings chosen by the user at the alert. For example, 'Remember My Answer'.
Treat As - Whether or not the user applied a specific ruleset to the file at the alert. The ruleset tells CCS the restriction level to apply to the file in future. Example rulesets include 'Treat as a safe application, or 'Treat as an installer'.
Event - Click 'Related Event' to view more details about the incident that triggered the alert.
A task log is a record of a CCS operation such as a virus scan or database update. The task log area shows all tasks run, their completion status, and other details.
Date & Time - When the event occurred.
Type - The task that was performed. For example, 'Antivirus scan', or 'Database update'.
Parameter:
OR
Completed - The time that the operation finished
Code - Error code generated by Windows for CCS tasks that were not successful. No code is shown if the task finished successfully.
Info and additional info - Shows further details about the task. For update tasks, these fields show the old and new version numbers. For scan tasks, they show the number of items scanned and the number of viruses found.
The file list is an inventory of executables and applications on your computer. The list shows the file name, vendor, the date the file was discovered, and the file's trust rating.
File list logs are a record of any modifications to these files. Logged actions include adding a new file, removing a file, or changing the trust rating of a file.
Date & Time - When the event occurred.
Path - The location or the SHA 1 hash value of the file that was changed.
Modifier - The service or user that made the change.
Action - Whether the file was added, removed, or assigned a new rating
Property - Whether the current trust rating was assigned by Comodo, an administrator, or a user.
Old Rating - The trust rating of the file before the change.
New Rating - The trust rating of the file after the change.
CCS ships with a list of trusted vendors who have a reputation for creating legitimate, safe software. CCS allows unknown files which are digitally signed by one of these trusted vendors to run. Click 'Settings' > 'File Rating' > 'Vendor List' to view the list.
Date & Time - When the change event occurred.
Vendor - The name of the software publisher
Modifier - Who made the change (User or Comodo).
Action - Whether the vendor was added, removed, or assigned a new rating
Property - Whether the current rating was assigned by Comodo, an admin, or a user.
Old Rating - The trust rating of the vendor before the change.
New Rating - The trust rating of the vendor after the change.
Configuration change logs are a record of locally made changes to CCS settings
Date & Time - When the configuration change was done.
Component - The CCS interface that was modified.
Action - Short description of the change made to the CCS component. For example, if a setting was changed, or an exclusion was created.
Modifier - The service or user that made the change. Possible modifiers include 'User', 'Antivirus Alert', 'Auto-Learn', 'Firewall Alert', 'HIPS Alert', 'Containment Alert', 'Scheduler' and 'Comodo'.
Name - The item featured in the modification. This will vary depending on the component.
Old Setting - The value before the configuration change.
New Setting - The value after the configuration change.
CCS records all events from the virtual desktop. Events that are recorded include:
Date & Time - When the event occurred
Action - The operation executed
Status - Whether the action taken was a success or failure
The logs show items flagged by data loss prevention discovery scans and monitoring events:
Date & Time - When the event occurred.
Target - The item affected by the rule.
Rule Name - The DLP rule that found the target item. This could be a DLP discovery rule or a monitoring rule.
Rule Type – Whether rule is a DLP discovery rule or a removable storage rule.
Action - How the file was handled in the DLP event.
Status - Shows whether the rule executed successfully or not.
Details - The specifics of the data found.
The screen shows the name of the file, and the rule/pattern which discovered sensitive data in the file.
The 'match' column shows the first and last characters of the actual discovered data. The option to show this should be enabled in the discovery rule.
You can run a simple filter of events by date, and use advanced filters to conduct more complex searches.
No filtering - Show every event logged since CCS was installed. If you have cleared the logs since installation, this option shows all logs created since that clearance.
Within last - Show all logs from a certain point in the past until the present time.
Except last - Exclude all logs from a certain point in the past until the present time.
Today - Show all events logged today, from 12:00 am to the current time. (Default)
Current Week - Show all events logged from the previous Sunday to today.
Current Month - Display all events logged from 1st of the current month to today.
Within the period of - Show logs between a custom date range.
You can also right-click inside the log viewer module and choose the time period.
Advanced filters let you run complex queries based on a variety of criteria. Search parameters vary from module to module.
Click the following links to view the options available with each module:
Filter Category | Description | Parameters |
---|---|---|
Action |
Filter logs based on the action taken by CCS against the detected threat. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' will invert your choice. |
Select the filter parameter:
|
Location | Filter the log entries related to events logged from a specific location. |
Enter the text or word that needs to be filtered For example, if you select 'Contains' option from the drop-down and enter the phrase 'C:/Program Files/' in the text field, then all events containing the entry 'C:/Program Files/' in the 'Location' field are displayed. |
Malware Name | Filter the log entries related to specific malware. |
Enter the text in the name of the malware that needs to be filtered. For example, if you choose 'Contains' from the drop-down and type 'siins' in the text field, then all events with 'siins' in the 'Malware Name' field are shown. |
Status |
Filter the log entries based on the success or failure of the action taken against the threat by CCS. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' will invert your choice |
Select the filter parameter:
|
Filter Category | Description | Parameters |
---|---|---|
Action |
Filter logs based on the action taken by CCS against the detected threat. |
Select the filter parameter:
|
Location | Filter the log entries related to events logged from a specific location. |
Enter the text or word that needs to be filtered For example, if you select 'Contains' option from the drop-down and enter the phrase 'C:/Program Files/' in the text field, then all events containing the entry 'C:/Program Files/' in the 'Location' field are displayed. |
Malware Name | Filter the log entries related to specific malware. |
Enter the text in the name of the malware that needs to be filtered. For example, if you choose 'Contains' from the drop-down and type 'siins' in the text field, then all events with 'siins' in the 'Malware Name' field are shown. |
Status |
Filter the log entries based on the success or failure of the action taken against the threat by CCS. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' will invert your choice |
Select the filter parameter:
|
Filter Category | Description | Parameters |
---|---|---|
Action |
Filter logs based on events according to the response (or action taken) by the firewall. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' will invert your choice |
Select the filter parameter:
|
Application | Filter logs based on events propagated by a specific application |
Enter the text or word that needs to be filtered. For example, if you choose 'Contains' from and enter the phrase 'cuckoo' in the text field, then all FW events containing the entry 'cuckoo' in the 'Application' column are displayed |
Destination IP |
Filter logs based on events with a specific target IP address Select 'Equal' or 'Not Equal' option from the drop-down box. 'Not Equal' will invert your selected choice. Select 'IPv4' or 'IPv6' from the drop-down box. |
Enter the IP address of the destination server or host, to filter the events that involve the connection attempts from/to that destination server or host. For example, if you choose 'Contains' option from the drop-down, select IPv4 and enter 192.168.111.11 in the text field, then all events containing the entry '192.168.111.11' in the 'Destination IP' column will be displayed. |
Destination Port |
Filter logs based on events that involved a specific target port number |
Enter the destination port number in the text entry field |
Filter Category | Descriptions | Parameters | |
---|---|---|---|
|
For example, if you choose 'Equal' option from the drop-down and enter 8080 in the text field, then all events containing the entry '8080' in the 'Destination Port' column will be displayed. | ||
Direction |
Filter logs based on events of inbound or outbound nature. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' will invert your choice |
Select the filter parameter:
|
|
Protocol |
Filter logs based on events that involved a specific protocol. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' will invert your choice |
Select the filter parameter:
|
|
Source IP |
Filter logs based on events that originated from a specific IP address Select 'Equal' or 'Not Equal' option from the drop-down box. 'Not Equal' will invert your selected choice. Select 'IPv4' or 'IPv6' from the drop-down box. |
Enter the IP address of the source server or host, to filter the events that involve the connection attempts from/to that source server or host system. For example, if you choose 'Contains' then select IPv4 and enter 192.168.111.22 in the text field, then all events containing the entry '192.168.111.11' in the 'Source IP' column will be displayed. |
|
Source Port |
Filter logs based on events that involved a specific source port number Select any one of the option the drop-down:
|
Enter the destination port number in the text entry field For example, if you choose 'Equal' and enter 8080 in the text field, then all events containing the entry '8080' in the 'Source Port' column will be displayed. |
Filter Category | Description | Parameters |
---|---|---|
Application | Filter logs based on events propagated by a specific application |
Enter the search criteria for filtering the logs in the text field. For example, if you choose 'Contains' from the drop-down and enter the phrase 'cuckoo' in the text field, then all events containing the entry 'cuckoo' in the 'Application' column are displayed. |
Action |
Filter logs based on events according to the response (or action taken) by HIPS Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' will invert your choice. |
Select the filter parameter:
|
Target | Filter logs based on events that involved a specified target application. |
Enter the search criteria for filtering the logs in the text field. For example, if you choose 'Contains' and enter the phrase 'svchost.exe' in the text field, then all e |
Filter Category | Description | Parameters |
---|---|---|
Application | Show events propagated by a specific application. |
Enter the search criteria for filtering the logs in the text field. For example, if you choose 'Contains' and enter the phrase 'pcflank' in the text field, then all events containing the entry 'pcflank' in the 'Application' column are displayed. |
Rating |
Show events which concern files that have a specific trust-rating. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' will invert your choice. |
Select the filter parameter:
|
Action |
Show events where a specific action was applied to the file by CCS Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' will invert your choice |
Select the restriction level(s) applied by the container to the applications, either automatically of or chosen by the user from the alert.
|
Contained by |
Show events where the file was isolated by a specific module or user Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' will invert your selected choice. |
Select the source(s) by which the applications were contained.
For example, if you choose 'Contains' and select the 'User' checkbox, then only events involving applications that were manually run inside the container are displayed. |
Parent Process | Show files contained based on its source process |
Enter the name of the application associated with the process, that launched contained item as the search criteria for filtering the logs in the text field. For example, if you choose 'Contains' and enter the phrase 'RuntimeBroker.exe' in the text field, then all events containing the entry 'RuntimeBroker.exe' in the 'Parent Process' column are displayed. |
Parent Process ID |
Show events created by a source process ID Select 'Contains' or 'Does Not Contain' from the drop-down menu. |
Enter the process ID of the application associated, that launched contained item as the search criteria for filtering the logs in the text field. For example, if you choose 'Contains' and enter the ID '2612' in the text field, then all events containing the entry '2612' in the 'Parent Process ID' column will be displayed. |
Parent Process Hash |
Show events where items was contained based on its source process(es) specified by hash value(s) of executable file(s) associated with the source process(es) Select 'Contains' or 'Does Not Contain' from the drop-down menu. |
Enter the SHA1 hash value of the executable file associated with the process, that launched contained item as the search criteria. |
Filter Category | Description | Parameters |
---|---|---|
Website |
Show only events that involved a specific website Select 'Contains' or 'Does Not Contain' from the drop-down menu. |
Enter the website address in part or full, to filter the logs involving the website. For example, if you choose 'Contains' option from the drop-down and enter the phrase 'facebook.com' in the text field, then all events that involve the website 'facebook.com' in the 'Website' column are displayed. |
Category Name |
Show events that involved websites which are covered by a website filtering category. |
Enter the website filter category name, to filter the logs involving the category For example, if you choose 'Contains' and enter the phrase 'Malware Sites' in the text field, then all events involving websites in the 'Malware Sites' category are displayed. |
Action |
Show only events that involved a specific response by CCS Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' will invert your choice |
Select the action(s) to filter the logs involving those action(s).
|
Filter Category | Description | Parameters |
---|---|---|
Name | Filter the entries based on the type of the device. |
Enter the type of the device in full or part as your filter criteria in the text field. For example, if you choose 'Contains' and type 'USB Input Device' in the text field, you will see logs related to USB input devices like keyboards, mice and finger print scanners. |
Identifier | Filter entries based on the device ID of the external device. |
Enter the device ID of the device in full or part as your filter criteria in the text field. For example if you have chosen 'Contains' and entered 'USB\VID_0627&PID_0001', in the text field only those log entries related to external devices whose device ID contains the string are displayed. |
Class | Filter the entries based on the GUID of the device |
Enter a Device Class ID (GUID) in part or full as your search criteria For example, if you select 'Contains' option from the drop-down field and enter '4D36E967', then all events containing the entry '4D36E967' in the 'Class' field are displayed.. |
State | Filter events based on whether the device connection attempt was allowed or blocked. |
Select the parameter to refine your search.
|
Filter Category | Description | Parameters |
---|---|---|
Type |
Filter entries based on the class of autorun Select 'Equal' or 'Not Equal' from the drop-down. 'Not Equal' will invert your choice |
Choose from:
|
Location |
Filter entries based on the application path Select the 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' will invert your selected choice. |
Enter the location or a part of it as your filter criteria in the text field. For example, if you have chosen 'Contains' and entered 'C:/Program Files (x86)/Cuckoo Files/Cuckoo.exe in the text field, then only log entries with the same value in the 'Path' column are displayed. |
Modifier |
Filter logs by the file or user that launched the event. Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Enter the location or a part of it as your filter criteria in the text field. For example if you choose 'Contains' and enter 'C:/Users/tester/AppData/Roaming/Microsoft/Windows/Start Menu/Programs/Startup/UnknownAppUI3.exe' in the text field, then only log entries with the same value in the 'Path' column will be displayed. |
Action |
Filter the events based on CCS response to the detected threat Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' will invert your choice |
|
Detected By |
Filter the entries based on the CCS component that discovered the threat Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' will invert your choice |
Select the specific filter parameter to refine your search.
|
Status |
Filter the entries based on the success or failure of the action taken against the threat by CCS. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' will invert your choice |
Select the specific filter parameter to refine your search.
|
Filter Category |
Description |
Parameters |
---|---|---|
Advice |
Filter entries by the security recommendation in the alert. Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Enter the text or word as your filter criteria. For example, choose 'Contains' and enter the phrase 'you can safely allow this request' in the text field. |
Answer |
Filter the events based on what action the user selected at the alert. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Select the parameter to refine your search.
For example, if you choose 'Equal' from the drop-down and select the 'Add to exclusions' checkbox, only the alerts where you answered 'Ignore' > 'Ignore and Add to exclusions' are displayed.
|
Answered |
Filter logs based on the date the user answered the alerts. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Enter or select the required date from the date picker For example, if you select 'Equal' and select '07/31/2017', only alerts answered on 07/31/2017 are displayed. |
Description |
Filter the entries based on the description of the attempt displayed in the alert. Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Enter the text or word as your filter criteria. For example, if you select 'Contains' from the drop-down and enter 'connect to the internet', only the log entries of firewall alerts that contain the phrase 'connect to the internet' in the description are displayed. |
Option |
Filter the log entries where the user selected an additional options like 'Remember my answer', 'Submit as False Positive' from the alert. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Select the specific filter parameters to refine your search.
For example, if you choose 'Equal' from the drop-down and select 'Remember' from the checkbox options, only the log entries of alerts for which 'Remember my answer' option was selected are displayed. |
Treat as |
Filter events where the user chose specific actions on the alert. For example, 'treat as a safe application', 'treat as an installer' and so on. Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Enter the text or word as your filter criteria For example, if you have chosen 'Contains' from the drop-down and entered 'Installer' in the text field, only the log entries containing the phrase 'Installer' in the 'Treat As' column are displayed. |
Alert Type |
Filter the log entries based on the CCS component that triggered the alert Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Select the specific filter parameters to refine your search.
For example, if you select 'Equal' from the drop-down and select 'Antivirus Alert' checkbox, only the log of antivirus alerts are displayed. |
Filter Category |
Description |
Parameters |
Code |
Filter the entries based on specified error code Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Enter the code or a part of it as your filter criteria in the text field. For example, if you have select 'Equal' and entered '0x80004004' in the text field, then only entries containing the value '0x80004004' in the 'Code' column are displayed. |
Completed |
Filter events based on tasks successfully finished on the specified date Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Enter or select the required date from the date picker For example, if you choose 'Equal' and select '08/01/2019', only the logs of tasks completed on 08/01/2019' are displayed. |
Parameter |
Filter the entries based on the specified parameter. A 'parameter' is a sub-type of the main task type. For example, 'Quick Scan' and 'Rating Scan' are both parameters of the main task type 'Antivirus Scan'. Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Enter the text or word as your filter criteria. For example, if you choose 'Contains' option from the drop-down and enter the phrase 'Quick Scan' in the text field, then only the entries of 'Antivirus Scan Tasks' with the scan parameter 'Quick Scan' are displayed. |
Type |
Filter the entries based on the CCS tasks category. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Select the specific filter parameters to refine your search.
|
Filter Category |
Description |
Parameters |
---|---|---|
Location |
Filter the entries based on the file path whose trust rating was changed Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice.
|
Enter the location or a part of it as your filter criteria in the text field. For example if you have chosen 'Contains' and entered 'C:/Program Files (x86)/Cuckoo Files/Cuckoo.exe in the text field, then only log entries with the same value in the 'Path' column are displayed. |
Modifier |
Filter events based on who changed the file rating Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Select the filter parameter to refine your search
For example, if you select 'Equal' from the drop-down and select 'User' checkbox, only logs of changes done by the users are displayed. |
Action |
Filter the entries based on the file activity Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Select the filter parameter to refine your search
For example, if you select 'Equal' from the drop-down and select 'Removed' checkbox, only the logs of files that were removed from the file list are displayed. |
Rating Source |
Filter the entries by who provided the file rating Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Ratings can be provided by:
For example, if you select 'Equal' from the drop-down and select 'User' checkbox, only the logs of files that were rated by the users are displayed. |
Old Rating |
Filter the entries based on trust rating of files before the change Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Select the filter parameter to refine your search
For example, if you select 'Contains' from the drop-down and select 'Unrecognized' checkbox, only the logs of files that are rated as 'Unrecognized' in the 'Old Rating' column are displayed. |
New Rating |
Filter logs by the trust rating of files after the change Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Select the filter parameter to refine your search
For example, if you select 'Contains' from the drop-down and select 'Malicious' checkbox, only the logs of files that are rated as 'Malicious' in the 'New Rating' column are displayed. |
File Hash |
Filter logs by hash value Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
|
Filter Category |
Description |
Parameters |
---|---|---|
Vendor |
Filter logs by the software publisher name whose trust rating was changed Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice.
|
Type the name of the vendor in full or part in the text field. For example if you choose 'Contains' and enter 'Digital' in the text field, only those log entries related to the vendors who has contain 'Digital' as a part in their name are displayed. |
Modifier |
Filter logs by who changed the vendor rating Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Select the filter parameter to refine your search
For example, if you select 'Equal' from the drop-down and select 'User' checkbox, only logs of changes done by the users are displayed. |
Action |
Filter logs by the type of change made to the vendor list. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Possible actions:
For example, if you select 'Equal' from the drop-down and select 'Removed' checkbox, only the logs of vendors that were removed from the vendor list are displayed. |
Property |
Filter logs by the entity that provided the vendor rating Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Entities that can provide trust ratings:
For example, if you select 'Equal' from the drop-down and select 'User Rating' checkbox, only the logs of vendors that were rated by users are displayed. |
Old Rating |
Filter logs by the trust rating of the vendor before the change Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Select the filter parameter to refine your search
For example, if you select 'Contains' from the drop-down and select 'Unrecognized' checkbox, only the logs of vendors that are rated as 'Unrecognized' in the 'Old Rating' column are displayed. |
New Rating |
Filter logs by the vendor's trust rating after the change. Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Possible new trust ratings are:
For example, if you select 'Contains' from the drop-down and select 'Malicious' checkbox, only the logs of vendors that are rated as 'Malicious' in the 'New Rating' column are displayed. |
Filter Category |
Description |
Parameters |
---|---|---|
Action |
Filter logs by the type of change that was made. For example, rule modified, file exclusion created. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Options are:
|
Modifier |
Filter events based on who changed the configuration such as the user, administrator and response given to an alert Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
The possible modifiers are:
For example, if you select 'Equal' from the drop-down and select 'User' checkbox, only logs of changes done by the users are displayed. |
Name |
Filter the entries based on object label that was affected by the configuration change, for example, Shared Spaces, Windows Management and so on Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Enter the object name as filter criteria in the text box. For example, if you choose 'Contains' then enter the phrase 'surfer.exe' in the text field, then you will only see logs with surfer.exe in the name column. |
Component |
Filter logs by the object modified by the action. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Select the affected object. It is not possible to list all possible objects in this table. Please consult the list in the search interface.
|
Filter Category |
Description |
Parameters |
---|---|---|
Action |
Filter logs by the type of virtual desktop activity. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Possible activities:
For example, if you select 'Equal' from the drop-down and select 'Session Started' checkbox, only the session initiated events are displayed in the 'Action' column. |
Status |
Filter logs by whether the event was was successful or not. Examples include paused sessions successfully resumed, wrong PIN entered and user could not resume a paused session. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Possible outcomes are:
|
Filter Category |
Description |
Parameters |
---|---|---|
Target |
Filter entries by document location and / or storage device. Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Enter the location, or a part of it, as your filter criteria. |
Rule |
Filter entries by rule name Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your choice. |
Enter the DLP rule name, or a part of it, as your filter criteria. |
Action |
Filter entries by the action taken on the target. The action may be: 1) An action CCS took on target a file. 2) An action that a user took on the target file. |
|
Status |
Filter logs by whether the event was was successful or not. Select 'Equal' or 'Not Equal' from the drop down. 'Not Equal' inverts your choice. |
Possible outcomes are:
|
The CCS log viewer lets you save the logs of a chosen module as an HTML file.
CLOUD BASED IT MANAGEMENT SOFTWARE FOR
MSPs and ENTERPRISE
Remote Monitoring and Management | Service Desk | Patch Management
Now Add Up To 50 Devices for Free