Logs include analyses of network activity that let you identify security issues and reduce malicious use of your network. You can send logs to a syslog server or view them through the log viewer. You can also view Sandstorm activity and the results of any datei analysis. Use these results to determine the level of risk posed to your network by r