Description
This guide will outline how to read and understand the logs that Conceal offers in regards to your device's browsing with Conceal. These logs are specific to your own device and information from other devices cannot be found here.
Procedure
- To access your logs, click the Conceal icon to open up the extension interface. The landing page has many different options. You can click into any of the graphs to get more details:
- Threats Detected: The number of times ConcealBrowse detected a threat on a malicious or potentially malicious site
- Isolated Sessions: The number of sessions that were placed in isolation due to Conceal detecting threats on the site
- Policy Block: The number of sites you attempted to access but were blocked by a policy set by administration.
- Scanned URLs: How many URLs have been scanned on this device since ConcealBrowse has been turned on. - You will see sections showing you more details on each of the reports mentioned above. Some more details that you might find useful when reading the logs:
- Timestamp: The date and time the URL was accessed.
- Age: How long ago the URL was accessed.
- Action: The decision and actions that were taken on the URL.
- Detect - The URL was accessed but no further action was taken, meaning it was not placed in isolation or pre-isolation.
- Preisolation - The URL was accessed and Conceal let the user know that it is considered malicious and why.
- Isolation - The user went into pre-isolation and continued past that by letting Conceal know they would like to continue on the site but in a safe environment which is isolation.
- URL: The URL that was accessed and analyzed
0
0
Was this article helpful?
0 out of 0 found this helpful
Articles in this section
- Browser Extension Management Hierarchy and Precedence
- Clear ConcealBrowse Extension Data on Windows
- Conceal Standard Support
- ConcealBrowse extension interface walkthrough
- Disabling ConcealBrowse vs. Uninstalling
- Does ConcealBrowse replace antivirus or EDR?
- End User Guide for submitting feedback
- Getting started with ConcealBrowse as an end user
- How do I know the latest version of ConcealBrowse?
- How do I prepare for an internal phishing campaign with ConcealBrowse?