Views:
Trend Micro Apex Central log types correspond to specific data views for custom report templates. You can use the following data views to create custom report templates for your log query results.
For more information, see the following topics:

Security Logs

Log Name
Data View
Description
System Events:
Virus/Malware
Detailed Virus/Malware Information
Provides specific information about the virus/malware detections on your network, such as the managed product that detected the viruses/malware, the name of the virus/malware, and the infected endpoint
For more information, see Detailed Virus/Malware Information.
Spyware/Grayware
Detailed Spyware/Grayware Information
Provides specific information about the spyware/grayware detections on your network, such as the managed product that detected the spyware/grayware, the name of the spyware/grayware, and the name of the infected endpoint
For more information, see Detailed Spyware/Grayware Information.
Suspicious Files
Detailed Suspicious File Information
Provides specific information about suspicious files detected on your network
For more information, see Detailed Suspicious File Information.
Behavior Monitoring
Detailed Behavior Monitoring Information
Provides specific information about Behavior Monitoring events on your network
For more information, see Detailed Behavior Monitoring Information.
Integrity Monitoring
Integrity Monitoring Information
Use to monitor specific changes to an endpoint, such as installed software, running services, processes, files, directories, listening ports, registry keys, and registry values
For more information, see Integrity Monitoring Information.
Application Control
Detailed Application Control Violation Information
Provides specific information about application control violations on your network, such as the violated Security Agent policy and criteria​
Device Control
Device Access Control Information
Provides specific information about Device Access Control events on your network
For more information, see Device Access Control Information.
Endpoint Security Compliance
Detailed Endpoint Security Compliance Information
Provides specific information about endpoint security compliance on your network
Endpoint Security Violations
Detailed Endpoint Security Violation Information
Provides specific information about endpoint security violations on your network
Predictive Machine Learning
Detailed Predictive Machine Learning Information
Provides specific information about advanced unknown threats detected by Predictive Machine Learning
Virtual Analyzer
Detailed Virtual Analyzer Detection Information
Provides specific information about advanced unknown threats detected by Virtual Analyzer
For more information, see Virtual Analyzer Detection Information.
Virtual Analyzer Suspicious Objects
Detailed Virtual Analyzer Suspicious Object Impact Information
Provides detailed information about the impact of Virtual Analyzer suspicious objects
Attack Discovery
Attack Discovery Detection Information
Provides general information about threats detected by Attack Discovery
For more information, see Attack Discovery Detection Information.
Gray Detections
Gray Detection Information
Provides detailed information about possible indicators of attack detected on your network
For more information, see Gray Detection Information.
Network Events:
Spam Connections
Spam Connection Information
Provides specific information about the source of spam on your network, such as the managed product that detected the spam, the specific action taken by the managed product, and the total number of spam detected
For more information, see Spam Connection Information.
Content Violations
Detailed Content Violation Information
Provides specific information about the email messages with content violations, such as the managed product that detected the content violation, the sender(s) and recipients(s) of the email message, the name of the content violation policy, and the total number of violations detected
For more information, see Detailed Content Violation Information.
Email Messages with Advanced Threats
Email Messages with Advanced Threats
Provides specific information about email messages with advanced threats, such as anomalous behavior, false or misleading data, suspicious and malicious behavior patterns, and strings that indicate system compromise but require further investigation to confirm
For more information, see Email Messages with Advanced Threats.
Web Reputation
Detailed Web Reputation Information
Provides compliance information about application activity detected by Web Reputation Services
For more information, see Detailed Web Reputation Information.
Web Violations
Detailed Web Violation Information
Provides specific information about web violations on your network
For more information, see Detailed Web Violation Information.
Firewall Violations
Detailed Firewall Violation Information
Provides specific information about firewall violations on your network, such as the managed product that detected the violation, the source and destination of the transmission, and the total number of firewall violations
For more information, see Detailed Firewall Violation Information.
Network Content Inspection
Network Content Inspection Information
Provides specific information about network content violations on your network
For more information, see Network Content Inspection Information.
Intrusion Prevention
Detailed Intrusion Prevention Information
Provides specific information to help you achieve timely protection against known and zero-day attacks, defend against web application vulnerabilities, and identify malicious software accessing the network
C&C Callbacks
Detailed C&C Callback Information
Provides specific information about C&C callback events detected on your network
For more information, see Detailed C&C Callback Information.
Suspicious Threats
Detailed Suspicious Threat Information
Provides specific information about suspicious threats on your network, such as the managed product that detected the suspicious threat, specific information about the source and destination, and the total number of suspicious threats on the network
For more information, see Detailed Suspicious Threat Information.
Application Activity
Detailed Application Activity
Displays specific information about application activities that violate network security policies
For more information, see Detailed Application Activity.
Mitigation
Detailed Mitigation Information
Provides specific information about tasks carried out by mitigation servers to resolve threats on your network
For more information, see Detailed Mitigation Information.
Correlation
Detailed Correlation Information
Provides specific information about detailed threat analyses and remediation recommendations
For more information, see Detailed Correlation Information.
Data Protection Events:
Data Loss Prevention
DLP Incident Information
Provides specific information about incidents detected by Data Loss Prevention
For more information, see DLP Incident Information.
Data Discovery
Data Discovery Data Loss Prevention Detection Information
Displays specific information about incidents detected by Data Discovery

Product Information

Log Name
Data View
Description
Managed Product:
Product Status
Product Status Information
Provides detailed information about managed products registered to the Trend Micro Apex Central server, such as the managed product version and build number, and the managed product server operating system
For more information, see Product Status Information.
Product Events
Product Event Information
Provides information about managed product events, such as managed products registering to Trend Micro Apex Central, component updates, and Activation Code deployments
For more information, see Product Event Information.
Product Auditing Events
Product Auditing Event Log
Provides information about managed product auditing events, such as managed product console access
For more information, see Product Auditing Event Log.
Apex Central:
Command Tracking
Command Tracking Information
Provides information about commands Trend Micro Apex Central issued to managed products, such as the date and time Trend Micro Apex Central issued commands for component updates or Activation Code deployments, and the status of the commands
For more information, see Command Tracking Information.
Apex Central Events
Apex Central Event Information
Provides information about Trend Micro Apex Central server events, such as managed products registering to Trend Micro Apex Central, component updates, and Activation Code deployments
For more information, see Apex Central Event Information.
Unmanaged Endpoints
Unmanaged Endpoints
Provides information about detected endpoints that do not have a Trend Micro Security Agent installed
For more information, see Unmanaged Endpoint Information.
User Access
User Access Information
Provides information about Trend Micro Apex Central user access and the activities users perform while logged on to Trend Micro Apex Central
For more information, see User Access Information.
Product Licenses
Detailed Product License Information
Provides information about the Activation Codes and licensing status of managed products or services, such as the managed product version and license expiration date
For more information, see Detailed Product License Information.