{"_id":"55e4c9903325e60d007fbebc","version":{"_id":"55db8f901a91690d007ad978","project":"55db8f8f1a91690d007ad975","__v":17,"createdAt":"2015-08-24T21:41:36.034Z","releaseDate":"2015-08-24T21:41:36.034Z","categories":["55db8f901a91690d007ad979","55db9856b3d6540d00886426","55dc751b00a8811900c230e3","55dc766255be9f21004ee250","55dc769200a8811900c230ed","55e4c701177b6e0d003330fa","55f4915caf0bc71900a53130","55f491b2be9c2b2100f0635d","560b22739c7be70d00100bd8","57488c53e8c6a420000b729c","574cefd95953e20e00f40f9f","5798edfd7700d30e00ad250c","579ac88234b5fd0e00b9e140","57c81c6d690c200e0047b72e","57d9b8fbda17c30e003897f1","57d9b90e608ea00e00f358d8","57d9b91cda17c30e003897f4"],"is_deprecated":false,"is_hidden":false,"is_beta":false,"is_stable":true,"codename":"","version_clean":"1.0.0","version":"1.0"},"parentDoc":null,"project":"55db8f8f1a91690d007ad975","user":"55dc702d7fa0290d00559106","__v":4,"category":{"_id":"55e4c701177b6e0d003330fa","pages":["55e4c718177b6e0d003330fb","55e4c7ea40cda60d003bad38","55e4c823e252ac0d00303a54","55e4c9333325e60d007fbeb8","55e4c97540cda60d003bad3e","55e4c9903325e60d007fbebc","55e4c9c33325e60d007fbebe","55e4c9ce40cda60d003bad41"],"project":"55db8f8f1a91690d007ad975","version":"55db8f901a91690d007ad978","__v":8,"sync":{"url":"","isSync":false},"reference":false,"createdAt":"2015-08-31T21:28:33.497Z","from_sync":false,"order":2,"slug":"dashboard","title":"Dashboard"},"githubsync":"","updates":[],"next":{"pages":[],"description":""},"createdAt":"2015-08-31T21:39:28.526Z","link_external":false,"link_url":"","sync_unique":"","hidden":false,"api":{"results":{"codes":[]},"settings":"","auth":"required","params":[],"url":""},"isReference":false,"order":11,"body":"We like having different graphics to display the information, but if you prefer getting the textual information straightforward, the event logs section is for you. You'll have access to a custom list of threats and attacks that you can sort as you wish. You can search for specific information, and of course, always select the desired time frame. It is the perfect tool to give your boss a clear portrait of how the new software you brought in is protecting​ the company.\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/cgGxvq8mQF20IDodVcxi_2015-09-02_1503.png\",\n        \"2015-09-02_1503.png\",\n        \"1164\",\n        \"503\",\n        \"#94acc0\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]","excerpt":"","slug":"event-logs","type":"basic","title":"Event logs"}
We like having different graphics to display the information, but if you prefer getting the textual information straightforward, the event logs section is for you. You'll have access to a custom list of threats and attacks that you can sort as you wish. You can search for specific information, and of course, always select the desired time frame. It is the perfect tool to give your boss a clear portrait of how the new software you brought in is protecting​ the company. [block:image] { "images": [ { "image": [ "https://files.readme.io/cgGxvq8mQF20IDodVcxi_2015-09-02_1503.png", "2015-09-02_1503.png", "1164", "503", "#94acc0", "" ] } ] } [/block]