Logs include important program events that happened on your computer. They also provide a summary of threats Trend Micro has protected you in detail.
Log Types
LOG TYPE | DESCRIPTION |
---|---|
LAST SCAN | Detailed results of the most recent scan, and what was done in response to the threats found. |
VIRUSES | Viruses, worms, and similar threats found, and the actions taken against them. |
SPYWARE | Suspected spyware programs found, and the actions taken against them. |
BROWSER COOKIES | Security threats found among your web browser cookies, and the actions taken against them. |
WEB THREATS | Websites that has been blocked because it could pose a security risk. |
UPDATES | Components of the program have been updated recently. |
UNAUTHORIZED CHANGES | Files, resources, and processes involved in attempts to make unusual changes to the computer settings (such attempts often indicate the presence of malicious software). |
DATA THEFT PREVENTION | Categories of items of protected information that have been intercepted. |
STARTUP PROTECTION | Windows drivers found to pose a risk to your security on computers running Microsoft Windows 8. |
NETWORK | Source and destination of online threats found, identified by the IP address (every device connected to a network has an IP address). |
FOLDER SHIELD | Programs stopped to prevent them from accessing files Folder Shield protects. |
EXPLOIT PROTECTION | Programs stopped to prevent attackers from taking advantage of security weaknesses. |
PARENTAL CONTROLS | Websites Parental Controls blocked. |
REGAIN DISK SPACE | Files removed to regain disk space. |
CLEAN PRIVACY DATA | Files removed to improve your privacy. |
RANSOMWARE | Suspected ransomware programs and websites found, and the actions taken against them. |
SECURE ERASE | Files Quick Erase or Permanent Erase deleted. |
WIFI ADVISOR | Access points (wireless networks) recognized as risky or dangerous. |
You must activate some features like Parental Controls, Secure Erase, and Data Theft Prevention before seeing any reports or data from them.
Responses
RESPONSE | DESCRIPTION |
---|---|
CLEANED | A threat was removed from a file. |
REMOVED | A file with an unremovable threat or a suspected spyware program was deleted. |
RESTART REQUIRED | You must restart the computer to finish removing all remnants of the threat. |
ACCESS DENIED | The scan did not have full “read/write” access to where the threat was found (such as a CD-ROM or network drive). |
To deal with any unresolved threats, click the status and follow the instructions.
Source : Official Trend Micro Brand
Editor by : BEST Antivirus KBS Team