QNAP

QNE ADRA 1.0.x

Managing Threat Activity Logs

You can perform various operations on threat activity logs in Security Operations > Threat Analysis or System > Logs.

Task

User Action

Refresh the list

  1. Go to Security Operations > Threat Analysis.

  2. Click .

Sort by column

  1. Go to Security Operations > Threat Analysis.

  2. Next to a column name, click , , or .

Group by category

  1. Go to Security Operations > Threat Analysis.

  2. Click No grouping.

  3. Select a group.

Filter by time

  1. Go to Security Operations > Threat Analysis.

  2. Click Last 24 hours.

  3. Select a time period.

Search the list

  1. Go to Security Operations > Threat Analysis.

  2. Next to , enter keywords.

Tip:

For advanced search options, click .

Export all logs

  1. Go to Security Operations > Threat Analysis.

  2. Click .

  3. Select the maximum number of logs allowed per file.

  4. Click Export.

Set log retention time

  1. Go to System > Logs.

  2. Next to Log retention time, select a time period to retain logs.

Delete all logs

  1. Go to System > Logs

  2. Click Delete All Logs.