This feature allows you to query security logs, including virus scan logs, brute-force attack logs, cyber attack logs, and vulnerability scan logs, to facilitate security event analysis and processing.
Steps
Go to Logs page. For cyber attack logs, you can add a detection rule to the whitelist to allow the cyber attack event. To modify the rule subsequently, go to Security Settings > Blacklist and Whitelist. For details, see section Blacklist and Whitelist.