Understanding Logs

Personal Firewall logs are some of the key sources of information on how your Personal Firewall interacts with the network. With logs, you can tell when you have been blocked from the network, and to some extent why. You can also troubleshoot connectivity problems or possible network attacks.

In the Personal Firewall, a log is a record of information attempting to enter or exit you computer through your network connection. There are four separate logs that monitor different aspects of your network connection.

Logs are an important method for tracking your computer's activity and interaction with other computers and computer networks. They are particularly useful in detecting potentially threatening activity, such as port scanning, that is aimed at your computer.

To view the different logs available in the Personal Firewall, click on the Logs icon on the toolbar at the top of the main screen.

Click the Logs button to view the log that you most recently viewed


OR click the down arrow and select a log type

There are four different logs in the Personal Firewall:

Another important capability of the Personal Firewall is Back Tracing, which enables you to use ICMP to determine all the hops between your computer and an intruder on another computer.