Specifications

Protecting Computers from Web-based Threats
6-7
Web Reputation Logs
Configure both internal and external clients to send Web reputation logs to the server.
Do this if you want to analyze URLs that OfficeScan blocks and take appropriate action
on URLs you think are safe to access.
To keep the size of logs from occupying too much space on the hard disk, manually
delete logs or configure a log deletion schedule. For more information about managing
logs, see Managing Logs on page 8-16.
To view Web reputation logs:
PATH: LOGS > NETWORKED COMPUTER LOGS > SECURITY RISKS > VIEW LOGS > WEB REPU-
TATION LOGS
NETWORKED COMPUTERS > CLIENT MANAGEMENT > LOGS > WEB REPUTATION LOGS
1. Specify log criteria and click Display Logs.
2. View logs. Logs contain the following information:
Date/Time OfficeScan blocked the URL
Computer where the user accessed the URL
•Blocked URL
•URL's risk level
Link to the Trend Micro Web Reputation Query system that provides more
information about the blocked URL
3. To save the log to a comma-separated value (CSV) file, click Export to CSV. Open
the file or save it to a specific location. A CSV file usually opens with a spreadsheet
application such as Microsoft Excel.