Reading log data captured by ConcealBrowse Reading log data captured by ConcealBrowse

Reading log data captured by ConcealBrowse

Description

This guide will outline how to read and understand the logs that Conceal offers in regards to your device's browsing with Conceal. These logs are specific to your own device and information from other devices cannot be found here. 

 

Procedure

  1. To access your logs, click the Conceal icon to open up the extension interface. The landing page has many different options. You can click into any of the graphs to get more details:
    - Threats Detected: The number of times ConcealBrowse detected a threat on a malicious or potentially malicious site
    - Isolated Sessions: The number of sessions that were placed in isolation due to Conceal detecting threats on the site
    - Policy Block: The number of sites you attempted to access but were blocked by a policy set by administration.
    - Scanned URLs: How many URLs have been scanned on this device since ConcealBrowse has been turned on.
    Screenshot 2024-09-05 at 11.04.06 AM.png
  2. You will see sections showing you more details on each of the reports mentioned above. Some more details that you might find useful when reading the logs:
    - Timestamp: The date and time the URL was accessed.
    - Age: How long ago the URL was accessed.
    - Action: The decision and actions that were taken on the URL.
       - Detect - The URL was accessed but no further action was taken, meaning it was not placed in isolation or pre-isolation.
       - Preisolation - The URL was accessed and Conceal let the user know that it is considered malicious and why. 
       - Isolation - The user went into pre-isolation and continued past that by letting Conceal know they would like to continue on the site but in a safe environment which is isolation. 

    - URL: The URL that was accessed and analyzedScreenshot 2024-09-05 at 11.11.09 AM.png