The Security Agent generates logs after detecting spyware and grayware and then sends the logs to the server.
- 
                Go to one of the following:
                
- 
                        
Logs > Agents > Security Risks
 - 
                        
Agents > Agent Management
 
 - 
                        
 - 
                In the agent tree, click the root domain icon (
) to
                    include all agents or select specific domains or agents.
             - 
                Go to the Spyware/Grayware Log Criteria
                    screen:
                
- 
                        
From the Security Risk Logs screen, click View Logs > Spyware/Grayware Logs.
 - 
                        
From the Agent Management screen, click Logs > Spyware/Grayware Logs.
 
 - 
                        
 - Specify the log criteria and then click Display Logs.
 - 
                View logs. Logs contain the following information:
                 
                    
Item
Description
Date/Time
The time the detection occurred
Endpoint
The endpoint on which the detection occurred
Spyware/Grayware
The name of the security threat
Scan Type
The scan that detected the threat
Result
The result of the action taken
Note:For more information on scan results, see Spyware/Grayware Scan Results.
IP Address
The IP address and port number of the source endpoint
MAC Address
The MAC address of the infected endpoint
Details
A link that displays the detailed analysis for the specific detection
 - (Optional) Select any spyware/grayware detection you consider harmless and click Add to Approved List to exclude the program from further scanning.
 - 
                To save logs to a comma-separated value (CSV) file, click
                        Export All to CSV. Open the file or save it to a
                    specific location.
                 
                    
The CSV file contains the following information:
- 
                            
All information in the logs
 - 
                            
User name logged on to the endpoint at the time of detection
 
 - 
                            
 
		