About logs

Trend Micro PC-cillin

About logs

PC-cillin keeps running logs of all update, virus, Site filter, and Personal Firewall activity. These logs can be viewed from the View Logs screen and provide a valuable source of information.

In addition to displaying the date and the time of each recorded log, the various log types provide log-specific information:

Update Logs: PC-cillin keeps a running record of each time it contacts Trend Micro to update the virus pattern file or program files. New logs are created when a download is performed. Update log entries also contain: the time the virus was detected; what file(s) were downloaded and installed from Trend Micro; the status--Success or Failure--of the download.

Virus Logs: PC-cillin keeps a record of all the viruses it detects and the actions performed on them. New logs are created when a virus is detected. Virus log entries also contain: the time the virus was detected; the type of scan--Real-time or a Scan Task--that detected the virus; the source type of the virus; the name of the virus; the name of the actual file that contains the virus; the success or failure the first action took on the infected file; and the success or failure the second action took on the infected file.

Site Filter Logs: PC-cillin records its Web Security activity. New logs are created when a Web site is blocked or harmful Web content encountered. Site filter log entries also contain: the time access to a restricted site was attempted; the URL, or Web address, that was blocked; the Action the Web filter took; and either Deny Access or Warn.

Personal Firewall Logs: PC-cillin logs all of its Internet activity. New logs are created when your computer is attacked from someone using the Internet. Personal Firewall log entries also contain: the time of the attack; the direction of the network traffic (IN/OUT); the type of protocol used; the IP address of the source; the port number of the source; the IP address of the destination; the port number of the destination; the name of the attack type.

See also:

Viewing logs

Exporting logs

Deleting logs