: For every file emulated, Check Point generates a report with screenshots of the simulated environment and forensic details about malicious attempts .
: You can generate reports (like the Network Activity report) from the Logs & Monitor view. Click Views or Reports , select your desired report, and click Export to PDF or Export to CSV . File Archive Reports (Threat Emulation) Continue to Checkpoint 1 [file archive]
If your report relates to specific archived files being scanned for threats: : For every file emulated, Check Point generates
: In SmartConsole , click the + tab to open a new view. Go to Tasks > Archive to see previously exported views and reports . File Archive Reports (Threat Emulation) If your report
: If you are trying to open an old log file that isn't indexed, you might need to use the logexport command via CLI to convert it to a readable .txt or .csv format .