ITarian Help

Find the desired product help

IT Endpoint Manager

IT Endpoint Manager

Comodo Client Security for Mac - User Guide

English

Print Help Download Help
More Options - Introduction > View Logs > Antivirus Logs
  • Introduction To Comodo Client - Security For MAC
    • System Requirements
    • Install Comodo Client - Security For MAC
    • Start CCS
    • Understand CCS Alerts
  • The Summary Screen
    • View Antivirus Events
  • Antivirus Tasks - Introduction
    • Run A Scan
    • Update Virus Database
    • Quarantined Items
    • Scanner Settings
      • Real Time Scan
      • Manual Scan
      • Scheduled Scan
      • Exclusions
    • Scheduled Scans
    • Scan Profiles
  • More Options - Introduction
    • Preferences
      • Language Settings
      • Log Settings
      • Update Settings
    • Manage My Configurations
      • Comodo Preset Configurations
      • Import / Export And Manage Personal Configurations
    • Diagnostics
    • Browse Support Forums
    • Help
    • About
    • View Logs
      • Antivirus Logs
        • Filter Antivirus Logs
      • Alerts Displayed Logs
        • Filter Alerts Displayed Logs
      • Tasks Launched Logs
        • Filter Tasks Launched Logs
      • Configuration Change Logs
        • Filter Configuration Change Logs
  • Appendix 1 - CCS For Mac How To Tutorials
    • Scan Your Computer For Viruses
    • View Antivirus Events
    • Configure Database Updates
    • Quickly Set Up Security Levels
    • Change CCS Language Settings
    • Run An Instant Antivirus Scan On Selected Items
    • Create A Scheduled Scan
    • Restore Incorrectly Quarantined Items
    • Switch Off Automatic Antivirus Updates
    • Suppress Alerts With Silent Mode
  • About ITarian

Antivirus Logs

 

Antivirus logs contain statistics on all discovered threats. This includes the time of the event, the malware name, and the action that taken on the threat.




1. Date - The time of the event.


2. Location - The path where the threat was found.

3. Malware Name - Malware label.


4. Action - Action taken on the malware. This can be 'Quarantine', 'Detect' or Ignore'.


5. Status – States whether the attempted action succeeded or failed.


6. Scan UID - The unique identification code of the scan profile that caught the malware. Each profile has its own UID. All zeroes = code for a real-time scan.

Double-click on an entry to view a summary of the log:



 

You can right-click on an item to view further options:

 

  • Refresh – Adds recently created logs to the list
  • Advanced Filter – Filter AV events by various criteria, including action, type and more
  • Export... - Save the events list as an HTML file
Comodo Help
  • IT Platform:
  • Help
  • Scripts
  • Wiki
  • Forum
  • Developer
  • RMM
  • Patch Management
  • Service Desk
  • ITSM
  • Managed Service Provider
  • Managed Detection and Response
  • Ticketing System
  • Helpdesk
  • ITIL

Copyright 2025 Itarian