Whether the USG6000 series supports threat logs

The USG6000 series allows you to view threat logs on the web UI. By checking threat logs, you can view detection and defense records for network threats such as antivirus, intrusion prevention, DDoS, botnets, Trojan horses, and worms, learn historical and ongoing threat events, and adjust security policies or implement active defense in a timely manner.
The USG is deployed between the Internet and the network to be protected. Threat logs are generated when the USG detects viruses, threats, botnets, Trojan horses, worms, or attacks in traffic.
Do as follows to view traffic logs on the web UI:
1. Choose Monitor > Log > Threat Log to view threat logs.
2. Choose Customize and select/deselect conditions for threat log display.
3. Click Export to export threat logs in CSV format to the management PC. (Only devices with hard disks support this step.)

Scroll to top