A log is an automatically generated, time-stamped file that provides an audit trail for system
events or network traffic events that Prisma Access monitors. Log entries contain
artifacts, which are properties, activities, or behaviors associated with the logged
event, such as the application type or the IP address of an attacker. Each log type
records information for a separate event type. For example, Prisma Access may
generate a Threat log to record traffic that matches a spyware, vulnerability, or
virus signature. Prisma Access Cloud Management provides Network logs (such as
Traffic, Threat, URL, File, HIP Match), Endpoint logs, and Common logs (System and
Configuration).You can view details for each log entry, and for threat logs, you can
review threat details and see if there are any threat overrides in place.