3

Access to eero logs for to investigate security threats

In case a security threat is detected and blocked on a device, eero provides limited information about the event, e.g. threat category and number of instances.

eero should allow user to access device logs to allow the investigation about the occurred issue and conduct root cause analysis.

1reply Oldest first
  • Oldest first
  • Newest first
  • Active threads
  • Popular
  • I’m currently researching the 802.11 standard to see how much logging and how much access to those logs is mandatory for these devices to be considered compliant. Based on some responses to other questions in the subreddit, it seems that the engineers are very motivated to keep the system standards-compliant.

    Like
Vote3 Follow
  • 3 Votes
  • 5 mths agoLast active
  • 1Replies
  • 41Views
  • 2 Following

Need Help? We're here for you!

We're big on support, and we want to make sure you always have the best eero experience possible. Here are several resources you can use if you ever need our help!


Quick links

Community Guidelines

Help Center

Contact eero support

@eerosupport

eero.com