This feature allows you to query security logs, including virus scan logs, brute-force attack logs, cyber attack logs, and vulnerability scan logs, to facilitate security event analysis and processing.
Prerequisites
N/A
Precautions
N/A
Steps
Go to aSecurity > Security Logs and query logs. For cyber attack logs, you can add a detection rule to the whitelist to allow the cyber attack event. To modify the rule subsequently, go to Security Settings > Blacklist and Whitelist. For details, see section 4.6.5.3 "Blacklist and Whitelist."