Panda antivirus website1/3/2024 ![]() ![]() How can I reinstall the program if I've formatted my hard disk or changed my PC?.How can I activate licenses on several computers?.How can I extend the duration of the services?.FAQs (Frequently asked questions and answers).What services does the program include?.What can I do with the files in Quarantine?.Configuring in-depth scans and the automatic protection.Configuring scans and the automatic protection.Characteristics of the firewall protection.How to configure the protection against unknown threats.How to enable or disable the protection against unknown threats.Automatic protection against unknown threats.How to enable or disable the automatic protection against known threats.Automatic protection against known threats.Use the right-click menu on the Windows Taskbar (next to the system clock).Consult the up-to-the-minute online help.Information, inquiries and services on the website.In order to do this, simply click the title of the column. It is also possible to arrange the report list (in ascending or descending order) by any column. Similarly, you can filter the incidents by the date they occurred. More filters: If you select this option, a screen is displayed that allows you to select the type of incident you want to appear in the report. Virus incidents: If you select this option, the report will only show the incidents related to viruses. If you click the inverted arrow button in the Filter button, the following options will appear:Īll incidents: If you select this option, no filter will be applied and therefore, all the incidents that have occurred will be displayed. Similarly, you can also filter incidents by the date they occurred. You will be prompted to confirm that you want to delete it.įilter: By clicking on the Filter icon, a screen will be displayed in which you can select the type of incidents that will appear in the report. Enter the file name, the disk drive and the directory in which to save it.ĭelete: This button deletes the report. TXT, in ASCII format), in order to store it, consult it or export it to another computer. After entering this data, click OK.Įxport: Through this tool you can save the report in a text file (. Enter the word you want to look for and the location (field or column in the report) you want to look in: Incidents, Notified by, Additional information, or Result. Print:The report can be printed by specifying the name of the printer, the page range and the number of copies.įind:This button allows you to search the report. These buttons allow you to carry out the following operations: At the top of the report window there is a button bar. If you want more information about any of the events logged in the report, click it. Result: This field shows the action performed in the incident. that has led to the incident entry being inserted in the report.Īdditional information: This field displays further information about the events in the report (IP addresses that were blocked by the firewall, the paths where malware was detected, etc.).ĭate-time: This field displays the date and time the incident occurred. Notified by: This field specifies the scan type, automatic protection update, etc. The fields are:Įvent: This field specifies the action performed during the scan, or while one of the types of automatic protections has been enabled. The incidents are listed in the report with a column for each field. To access event reports at any time, click the Report in the main menu and then click View events report. Just after the scan has finished: When the scan finishes, click the Report button that is displayed in order to access the full report window. The report includes all the events occurred during the use of the program: threats detected, intrusions or attacks blocked by the firewall, updates or scans performed, etc. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |