Skip to content

Logs & Search

The Logs section of the Nyroxis Dashboard provides a clear, searchable, and structured view of all security-relevant events collected by Nyroxis Agent. It is the forensic core of the platform — designed to give both non-technical users and security professionals instant visibility into what is happening on their device.


Purpose of Logs View

The Logs module helps users understand: - What events occurred and when - Which processes, files, or network connections were involved - Whether the activity appears normal or suspicious - The full context of any event for forensic investigation

It turns raw encrypted event data into readable, timestamped, searchable entries.


Event Categories

Nyroxis organizes logs into intuitive groups:

1. Process Events

  • Process start and stop
  • Parent/child relationships
  • Execution paths and command-line parameters

2. Network Events

  • Outgoing and incoming connections
  • IP addresses and port details
  • Protocol types

3. File System Events

  • File creation, modification, and deletion
  • Access to sensitive directories
  • Registry changes

4. Privilege & Security Events

  • Elevation attempts
  • Access to restricted resources
  • System policy changes
  • Credential-related activity

5. System Activity

  • Service start and stop
  • Driver loading
  • Windows Event Log entries (Security, System, Application)
  • PowerShell and script execution

Search & Filtering

The Logs interface includes a powerful filtering panel:

Available Filters

  • Date and time range
  • Event category
  • Severity level (Critical / High / Warning / Info)
  • Source and channel
  • Process name
  • File path
  • Network endpoint
  • Keywords

Search Capabilities

  • Real-time filtering
  • Multi-field search
  • Export to CSV for legal documentation or external analysis

Designed to support both beginners and professional analysts.


Event Details

Clicking an event opens a details panel displaying: - Full event metadata - Process lineage - Related files or network connections - Severity score - Raw payload details


Privacy & Offline-First

All logs: - Are stored locally in the encrypted SQLite database - Are fully encrypted (AES-256) - Never leave the device - Are processed without any cloud interaction


Summary

The Logs & Search module provides a transparent, organized, and fully private way to explore system activity — giving users true forensic visibility without exposing any data externally.

© Nyroxis Documentation — Nyroxis® Endpoint Intelligence Platform
Built with MkDocs Material — Documentation auto-generated from public modules.