Logs include important program events that happened on your computer. They also provide a summary of threats Trend Micro has protected you in detail.
NOTE: Scan records are automatically deleted from the backend one year after detection and cannot be manually removed.
Log Types
| Log Type | Description |
|---|---|
| Last Scan | Detailed results of the most recent scan, and what was done in response to the threats found. |
| Viruses | Viruses, worms, and similar threats found, and the actions taken against them. |
| Spyware | Suspected spyware programs found, and the actions taken against them. |
| Web Threats | Websites that has been blocked because it could pose a security risk. |
| Updates | Components of the program have been updated recently. |
| Unauthorized Changes | Files, resources, and processes involved in attempts to make unusual changes to the computer settings (such attempts often indicate the presence of malicious software). |
| Data Theft Prevention | Categories of items of protected information that have been intercepted. |
| Startup Protection | Windows drivers found to pose a risk to your security on computers running Microsoft Windows 8. |
| Network | Source and destination of online threats found, identified by the IP address (every device connected to a network has an IP address). |
| Folder Shield | Programs stopped to prevent them from accessing files Folder Shield protects. |
| Exploit Protection | Programs stopped to prevent attackers from taking advantage of security weaknesses. |
| Parental Controls | Websites Parental Controls blocked. |
| Regain Disk Space | Files removed to regain disk space. |
| Clean Privacy Data | Files removed to improve your privacy. |
| Ransomware | Suspected ransomware programs and websites found, and the actions taken against them. |
| Secure Erase | Files Quick Erase or Permanent Erase deleted. |
| Wifi Advisor | Access points (wireless networks) recognized as risky or dangerous. |
| Dangerous Notifications | Notifications that have been blocked because they could pose a security risk. |
| AI App Protection | Programs are stopped to prevent them from accessing AI apps and services that are protected by AI App Protection. |
You must activate some features like Parental Controls, Secure Erase, Data Theft Prevention, Folder Shield, and AI App Protection before seeing any reports or data from them.
Responses
| Response | Description |
|---|---|
| Cleaned | A threat was removed from a file. |
| Removed | A file with an unremovable threat or a suspected spyware program was deleted. |
| Restart required | You must restart the computer to finish removing all remnants of the threat. |
| Access denied | The scan did not have full "read/write" access to where the threat was found (such as a CD-ROM or network drive). |
| Blocked | A suspicious website, notification, or application was prevented from loading or running. |
| Rated Dangerous | The URL or website has been identified as harmful or unsafe. |
To deal with any unresolved threats, click the status and follow the instructions.
