Page tree
Skip to end of metadata
Go to start of metadata

The individual modules have log functions that you can use to get an overview at any time of the actions that your G DATA software is carrying out to protect you.

You can access them by clicking the log icon  on the upper right hand side of the software.

Virus protection logs

The log area lists the logs made by the software. Click the  Start time ,  Type ,  Header , or  Status  column headers to sort the available logs accordingly. The  Save as  and  Print  buttons can be used to save log data as text files or print them out directly. To delete a log, highlight the entry in the table using the mouse and either press the Del key or click on the  Delete  button.

Firewall logs

The Logs area provides a comprehensive log file for every firewall action. Here you can open individual actions by double-clicking on them and print them out as required or save them as text files.

Backup logs

The Logs area provides a comprehensive log file for every action and every backup job. Here you can open individual actions by double-clicking on them and print them out as required or save them as text files. 

Spam protection logs

The Logs area provides a comprehensive log file for every action. Here you can open individual actions by double-clicking on them and print them out as required or save them as text files.

Parental controls logs

In the log area, you as the administrator have an overview of all attempts made by other users to call up blocked content. For that purpose you have to select a user from the list at the top of the screen to display his/her specific log.

Device control logs

The Logs area provides a detailed log file of every device manager activity.

  • No labels