You can view reports of application components and tasks using the graphical interface. Reports are displayed in the window that opens when clicking Reports in the lower part of the main window of the application graphical interface.
Report data is presented as a table that contains a list of events. Each line in the table contains information about a separate event. Event attributes are displayed in the table columns. Events logged while various components and tasks are running have different sets of attributes.
The following event importance levels are used in reports:
Critical – events with the critical importance level that need your attention as they indicate problems in the application operation or vulnerabilities in the device protection
High
Medium
Low
Information
Error
The following reports are available in the application:
Statistics. This report contains File Threat Protection and scan task statistics. You can update the displayed report by clicking the Reload button.
System audit. This report contains information about events that occur during the application operation and during the user interaction with the application.
Threat protection. This report contains information about the events that are logged while the following application components were running:
File Threat Protection.
Removable Drives Scan.
Anti-Cryptor.
Web Threat Protection.
Network Threat Protection.
Firewall Management.
Application Control.
Device Control.
Behavior Detection.
Exploit Prevention.
System Integrity Monitoring.
Web Control.
On-demand tasks. This report contains information about events logged by scan tasks, update tasks, and system integrity check tasks.