Execution Logs¶
The system records key information for each execution of security detection rules, including execution time, status, duration, executed DQL statements, number of bytes scanned, number of rows scanned, etc. These are ultimately presented uniformly through the execution log explorer.
List¶
On the execution log list page, you can view all execution log records.
You can manage them through the following operations:
- Filter based on detection rule name, ID, or execution duration.
- Search and locate using the log name.
Details¶
Click on a specific log to slide out the corresponding details page. You can view the basic information and extended attributes of that execution log.
