Protect keeps records of all DNS queries. These records are then stored as logs and presented to the client.
- Logs are stored in the Log tab.
2. Below are the configuration options you may select when viewing logs.
|Networks||Select the network you wish to generate the logs from. Leave black to select all networks.|
|Network Identities||Select the network identities you wish to generate the logs from. Leave black to select all network identities.|
|Categories||Select the categories you wish to generate the logs from. Leave black to select all categories.|
|Domains||Type in a custom domain|
Select the date range for the logs.
|Blocked||Shows all blocked logs.|
|Allowed||Shows all allowed logs.|
|Only Threats||Shows only threat logs.|
|Export||Exports the logs to a CSV file.|
A video below to help users understand the steps visually