Threat Intelligence & Remediation - Viewing Logs

This article contains information on viewing, filtering, searching, and exporting Mimecast Threat Remediation logs, including details on incident actions, message statuses, and associated incidents for effective threat management.

The Logs tab displays the actions taken against individual incidents, whether automatic or manual, in date order. By default, only the last five actions are displayed, but this can be increased to all actions taken in the last 30 days. From the log list, you can:

      • Search for a specific log.
      • Export the logs.
      • Filter the display (e.g., by message status).

Viewing Logs

You can view logs using the following steps:

  1. Log on to the Mimecast Administration Console.
  2. Navigate to Services | Threat Remediation menu item. The Threat Remediation home page is displayed.
  3. Click on the Logs tab. Alternatively, click on the View All Logs link in the bottom right corner. Logs are displayed in date order and display the following information:
Column Description
Incident  ID The unique code assigned to the incident. View the "Incident IDs" section of the Threat Remediation page for more information.
To Displays the email address of the message's recipients.
From Displays the email address of the message's sender.
Action

Indicates the type of action taken on an incident:

  • Remove: The message was deemed a threat and was manually removed from the user's mailbox.
  • Restore: The message was falsely identified as malicious, and was restored to the user's mailbox.
  • Identify: The message was deemed a threat, and the relevant action was automatically applied. 
Action Date The date and time an action was taken on an incident.
Message Status The message's status at the time of the Action Date.

Viewing a Log File's Associated Incident

To search for an incident from the Logs queue or to narrow the results:

  1. Click on the down arrow next to All and select one of the following options:
      • Incident ID: Search for an incident by the known ID number.
      • To: Search for the incident by the recipient's email address.
      • From: Search for the incident by the sender's email address.
  1. Enter any known message/data identifiers in the Search field.
  2. Click on the magnifying glass icon or press the Enter key. The search results display.
  3. Click on the three-dot icon to the right of the log, and click on the View Incident menu item. The corresponding incident is displayed.

Filtering Log Files

To filter the Logs queue, you can select from the following options:

  1. Date Range: Select a time period from the drop-down menu. Optionally click on Custom Range to display a date/time picker. Click on the Done button to update your results.
  2. Filters: All incident types display by default. Select one of the following:
      • Notify Only: Displays incidents where the Administrator is notified but no action has been taken.
      • Automatic: Displays incidents that have been automatically removed, with the administrator notified.
      • Manual: Displays incidents that the administrator has manually performed an action on.
      • Restore: Displays incidents confirmed as safe and restored to the user's mailbox 
  1. Show: By default, 50 incidents are displayed in the queue per page. Select between 50 to 300 incidents per page.
  2. Custom Settings: Click on the Settings icon in the top right corner to display a pop-out panel. Select the boxes of any columns you want to view and click the Apply button. Your custom selections display.

Exporting Log Data

To export the Logs queue to a .csv file:

  1. Click on the Export Data button. An Export Logs Data panel slides into view.
  2. Select the boxes of any data columns you want to include in the download file.
  3. Click on the Download button. The file is downloaded to your machine's desktop.

See Also...

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.