Activity Logs
Controls and Configuration
The Activity Logs show you everything Check has been doing to protect you. Here's how to use this information effectively.
Debug and Developer Settings
Enable Debug Logging
When enabled, Check logs additional detail about page scans, rule evaluations, and internal operations. By default, Check only logs blocked pages and security events. Enable debug logging when:
Troubleshooting detection issues
Working with support to diagnose problems
Investigating false positives or missed detections
Important: Debug logging increases storage usage and should be disabled after troubleshooting.
Developer Mode
Enables additional console logging visible in the browser's Developer Tools. This provides real-time information about Check's operations for advanced troubleshooting.
Simulate Enterprise Policy Mode (Dev Only)
This development-only feature simulates how the extension behaves when managed by enterprise policies. Useful for administrators testing policy deployments or understanding the end-user experience under policy management.
Log Filtering and Management
Event Type Filter
Filter logs by event type to focus on specific activities:
All Events - Shows everything Check has logged
Security Events - Threats detected, pages blocked, warnings issued
URL Access - Pages Check has analyzed (requires debug logging)
Threats Detected - Only shows actual threats found and blocked
Page Scans - Detailed scanning activity (requires debug logging)
Debug Events - Internal operations and detailed analysis (requires debug logging)
Log Actions
Refresh - Reload the current logs from storage
Clear Logs - Permanently delete all stored logs (cannot be undone)
Export Logs - Download logs as a JSON file for support or analysis
Reading Your Logs
When you open the Activity Logs section, you'll see a table with recent activity. Here's what each column means:
Timestamp - When the event happened
Event Type - What kind of activity (like "Threat Blocked" or "Page Scanned")
URL/Domain - Which website was involved
Threat Level - How dangerous it was (None, Low, Medium, High, Critical)
Action Taken - What Check did about it
Details - A summary of what happened
Additionally, clicking on a row will allow you to review detailed information on the event and the criteria used to make the threat level determination.
Understanding Common Log Entries
"Page Scanned" with Threat Level "None"
This is normal - Check scanned a page and found it safe
You'll see lots of these for legitimate websites
"Threat Blocked" with Threat Level "High"
Check found a dangerous page and blocked it
This is Check protecting you from a real threat
"Legitimate Access" with Threat Level "None"
Check verified this was a real Microsoft login page
You can trust this page with your credentials
Investigating Suspicious Activity
If you think something suspicious happened:
Look for recent "Threat Blocked" entries
Click on the entry to expand details
Check the URL - Does it look like a site you tried to visit?
Note the time - Does it match when you had problems?
Example Investigation:
You tried to log into Office 365 but got blocked. Looking at logs:Timestamp: 2024-01-15 14:30:22Event Type: Threat BlockedURL: office365-login-secure.com (suspicious domain)Threat Level: HighDetails: Phishing page impersonating Microsoft loginThis shows Check correctly blocked a fake Office 365 page.
Configuring Log Detail Level
For regular users:
Leave "Enable Debug Logging" unchecked
Leave "Enable Developer Console Logging" unchecked
Leave "Simulate Enterprise Policy Mode (Dev Only)" unchecked
For troubleshooting or working with support:
Check "Enable Debug Logging"
Reproduce the problem
Export logs (see below)
Send logs to support (see Common Issues for additional troubleshooting steps)
Uncheck debug logging when done (saves storage space)
For admins wanting to simulate end-user experience
Click "Simulate Enterprise Policy Mode (Dev Only)"
Review behavior, investigate setting, grab screenshots for documentation, etc.
Uncheck the setting when done and refresh the page to return to normal operations
Managing Your Log Data
Refreshing Logs:
Click "Refresh" to see the latest activity
Useful if you just experienced a security event
Clearing Old Logs:
Click "Clear Logs"
Confirm you want to delete all log history
Warning: This permanently deletes all logs
Exporting Logs for Support:
Click "Export Logs"
Choose where to save the file
The file will be named like
check-logs-2024-01-15.jsonSend this file to support when reporting issues
Real-World Scenarios
Scenario 1: Checking if Check is working
Go to Activity Logs
Look for recent "Page Scanned" entries
If you see recent entries, Check is working
If no recent entries, try visiting a Microsoft website to test
Scenario 2: Investigating a blocked page
Note the time when you were blocked
Go to Activity Logs
Look for "Threat Blocked" entries around that time
Click the entry to see why it was blocked
If you think it was blocked incorrectly, contact support with the log details or check Common Issues for known problems
Scenario 3: Preparing for support
Enable debug logging
Try to reproduce the problem
Export logs immediately after the problem occurs
Disable debug logging
Send the exported file to support or check Common Issues first
Last updated