Activity Logs
Activity Logs
The Activity Logs show you everything Check has been doing to protect you. Here's how to use this information effectively.
Reading Your Logs
When you open the Activity Logs section, you'll see a table with recent activity. Here's what each column means:
Timestamp - When the event happened
Event Type - What kind of activity (like "Threat Blocked" or "Page Scanned")
URL/Domain - Which website was involved
Threat Level - How dangerous it was (None, Low, Medium, High, Critical)
Action Taken - What Check did about it
Details - A summary of what happened
Additionally, clicking on a row will allow you to review detailed information on the event and the criteria used to make the threat level determination.
Understanding Common Log Entries
"Page Scanned" with Threat Level "None"
This is normal - Check scanned a page and found it safe
You'll see lots of these for legitimate websites
"Threat Blocked" with Threat Level "High"
Check found a dangerous page and blocked it
This is Check protecting you from a real threat
"Legitimate Access" with Threat Level "None"
Check verified this was a real Microsoft login page
You can trust this page with your credentials
Investigating Suspicious Activity
If you think something suspicious happened:
Look for recent "Threat Blocked" entries
Click on the entry to expand details
Check the URL - Does it look like a site you tried to visit?
Note the time - Does it match when you had problems?
Example Investigation:
You tried to log into Office 365 but got blocked. Looking at logs:Timestamp: 2024-01-15 14:30:22Event Type: Threat BlockedURL: office365-login-secure.com (suspicious domain)Threat Level: HighDetails: Phishing page impersonating Microsoft loginThis shows Check correctly blocked a fake Office 365 page.
Configuring Log Detail Level
For regular users:
Leave "Enable Debug Logging" unchecked
Leave "Enable Developer Console Logging" unchecked
Leave "Simulate Enteprise Policy Mode (Dev Only)" unchecked
For troubleshooting or working with support:
Check "Enable Debug Logging"
Reproduce the problem
Export logs (see below)
Send logs to support
Uncheck debug logging when done (saves storage space)
For admins wanting to simulate end-user experience
Click "Simulate Enterprise Policy Mode (Dev Only)"
Review behavior, investigate setting, grab screenshots for documentation, etc.
Uncheck the setting when done and refresh the page to return to normal operations
Managing Your Log Data
Refreshing Logs:
Click "Refresh" to see the latest activity
Useful if you just experienced a security event
Clearing Old Logs:
Click "Clear Logs"
Confirm you want to delete all log history
Warning: This permanently deletes all logs
Exporting Logs for Support:
Click "Export Logs"
Choose where to save the file
The file will be named like
check-logs-2024-01-15.json
Send this file to support when reporting issues
Real-World Scenarios
Scenario 1: Checking if Check is working
Go to Activity Logs
Look for recent "Page Scanned" entries
If you see recent entries, Check is working
If no recent entries, try visiting a Microsoft website to test
Scenario 2: Investigating a blocked page
Note the time when you were blocked
Go to Activity Logs
Look for "Threat Blocked" entries around that time
Click the entry to see why it was blocked
If you think it was blocked incorrectly, contact support with the log details
Scenario 3: Preparing for support
Enable debug logging
Try to reproduce the problem
Export logs immediately after the problem occurs
Disable debug logging
Send the exported file to support
Last updated