Protect keeps records of all DNS queries. These records are then stored as logs and presented to the client.
LOGS CONFIGURATION
- Logs are stored in the Log tab.
2. Below are the configuration options you may select when viewing logs.
Configuration Option | Description |
---|---|
Networks | Select the network you wish to generate the logs from. Leave black to select all networks. |
Network Identities | Select the network identities you wish to generate the logs from. Leave black to select all network identities. |
Categories | Select the categories you wish to generate the logs from. Leave black to select all categories. |
Domains | Type in a custom domain |
Date Range | Select the date range for the logs. |
Blocked | Shows all blocked logs. |
Allowed | Shows all allowed logs. |
Only Threats | Shows only threat logs. |
Export | Exports the logs to a CSV file. |
A video below to help users understand the steps visually