Skip to content

Logs & Search

The Logs section of the Nyroxis Dashboard provides a clear, searchable, and structured view of all security‑relevant events collected by the Nyroxis Agent.
It is designed to give both non‑technical users and professionals instant visibility into what is happening on their device.


Purpose of Logs View

The Logs module helps users understand: - What events occurred
- When they happened
- Which processes, files, or network connections were involved
- Whether the activity appears normal or suspicious

It turns raw system data into readable, timestamped entries.


Event Categories

Nyroxis organizes logs into intuitive groups:

1. Process Events

  • Process start / stop
  • Parent / child relationships
  • Execution paths

2. Network Events

  • Outgoing / incoming connections
  • IP / port details
  • Protocol types

3. File System Events

  • Creation
  • Deletion
  • Modification
  • Sensitive file access

4. Privilege & Security Events

  • Elevation attempts
  • Access to restricted resources
  • System policy changes

5. System Activity

  • Services
  • Drivers
  • Kernel‑related behaviors

Search & Filtering

The Logs interface includes a powerful filtering panel:

Available filters

  • Date & time range
  • Event category
  • Severity level
  • Process name
  • File path
  • Network endpoint
  • Keywords

Search capabilities

  • Real‑time filtering
  • Regex‑friendly (optional)
  • Multi‑field search
  • Instant refresh

Designed to support both beginners and analysts.


Event Details Panel

Clicking an event opens a details card displaying: - Full metadata
- Process lineage
- Related files or connections
- Severity score
- Explanation of risk
- Recommendations (if applicable)


Privacy & Offline‑First

All logs: - Are stored locally
- Are fully encrypted
- Never leave the device
- Are processed without cloud interaction

Nyroxis ensures that users retain full control over their event data.


Summary

The Logs & Search module provides a transparent, organized, and fully private way to explore system activity — giving users true visibility without exposing any data externally.

© Nyroxis Documentation — Nyroxis® Endpoint Intelligence Platform
Built with MkDocs Material — Documentation auto-generated from public modules.