The Reports pane displays a list of scans and real-time protection detections, in reverse chronological order.
A Protection Event that starts with the word Scan is a report summarizing the specified scan.
All other reports listed on this screen are detail pertaining to detections made by real-time protection.
A screenshot is shown here.
Selected reports may be viewed on screen, or exported to a text file for later viewing.
Please note that only manual (on demand) scans are available for users of the free version of Malwarebytes.
Scan Information
Scan Date: Date when scan was executed
Scan Time: Time when scan was completed
Log File: Log file name, which includes year, month, day, hour, minute, and second in the filename. Times use a 24-hour clock, and are referenced to the start time of the scan.
Administrator: Whether the user running the scan was logged on with administrator rights
Version Information
Version: Malwarebytes program version
Component Package Version: Currently installed version of package that includes various program sub-components
Update Package Version: Currently installed version of package that includes scanning engine and other related updates
License: License type (valid values are Free, Premium or Premium Trial)
System Information
OS: Operating System version, which also may contain Service Pack information
CPU: CPU type (valid values are x86 and x64)
File System Type: File system used on the primary (OS) disk drive (valid values are NTFS, FAT and FAT32)
User: Windows user name associated with this scan
Scan Details
Scan Type: Type of scan executed (valid values are Threat Scan, Custom Scan, Hyper Scan and Context Scan)
Result: Final scan result (valid values are cancelled, completed or failed)
Objects Scanned: Number of objects scanned
Time Elapsed: Elapsed time of scan, from start to finish
Processes: The number of items detected during the scan
Modules: The number of items detected during the scan
Registry Keys: The number of items detected during the scan
Registry Values: The number of items detected during the scan
Registry Data: The number of items detected during the scan
Folders: The number of items detected during the scan
Files: The number of items detected during the scan
Object Types/Targets Scanned. Eight object types/targets are listed. Each may be enabled (included in scan) or disabled (excluded from scan). These object types are:
Memory
Startup
Rootkits
File System
Archives
PUP
PUM
Heuristics
Threats Detected during scan execution, containing the following information:
Threat: Name of threat, or threat family (as categorized by Malwarebytes Research team)
Type: Container in which the threat was detected (file, registry key)
Location: Location where the threat was found; This will be a directory/file name for file system-based threats, and key/value name/value data for registry-based threats
Action: What action was taken with regard to the detected threat
ID: The identifier that Malwarebytes Research team uses for the specific threat. This may be requested by Malwarebytes Customer Success if a question arises pertaining to blocking of a specific threat.
The Scan Report may appear in two different forms.
If one or more threats were detected during a scan, the report will appear as:
Please note that the bottom portion of the report shows the threats detected during the scan.
It is scrollable when required.
The top portion of the report is a scrollable itemization of the user environment as described above, and shown here:
Viewing or Deleting Logs
You may view any log file by clicking the log to select it, then clicking the View Report button.
As mentioned previously, there are several output options for Protection Logs.
To delete logs, click the checkbox corresponding to those logs you wish to delete, then click the Delete button.
Please bear in mind that computers with significant threat activity will also have larger logs.
You should periodically check how much disk space is being used for logs, so that logs do not impact normal operation of your computer.
Please note that an Export button is shown at the bottom left corner of this screen.
This allows you to make a copy of the log for use by other programs.
You may export to your clipboard or to a text (TXT) file.