Threat Log

Diagnosis > Log > Threat

You can view, search, and export threat logs in the Threat Log page. You can perform the following actions: