10.4 Viewing suspicious operation logs
If you select one or more of the following items for Suspicious Operations to be Notified for the operation log policy, when suspicious operations are detected, operation logs for suspicious file transfer operations are displayed in the Security module.
-
Send/Receive E-mail with Attachments
-
Use Web/FTP Server
-
Copy/Move the File to External Device
To view operation logs for suspicious operations:
-
Display the Security module.
-
In the menu area, select Operation Logs and then Operation Log List.
-
Use the filter to display operation logs for which Suspicious Operations is marked with the warning icon ().
Operation logs for suspicious operations are displayed. Check the details of the operation logs, and take action if necessary.
Related Topics: