You can browse, search, and view Advanced Threat
Prevention logs that are automatically generated when a threat is
detected. Typically, this includes any qualifying threat signature
match that a Threat Prevention feature, including Inline ML, analyzes
unless it is specifically configured with a log severity level of
none. Log entries provide numerous details about the event, including
the threat level and, if applicable, the nature of threat.