10

Access to eero logs for to investigate security threats

In case a security threat is detected and blocked on a device, eero provides limited information about the event, e.g. threat category and number of instances.

eero should allow user to access device logs to allow the investigation about the occurred issue and conduct root cause analysis.

2replies Oldest first
  • Oldest first
  • Newest first
  • Active threads
  • Popular
  • I’m currently researching the 802.11 standard to see how much logging and how much access to those logs is mandatory for these devices to be considered compliant. Based on some responses to other questions in the subreddit, it seems that the engineers are very motivated to keep the system standards-compliant.

    Like
  • Not showing us the details of the threat blocked (source, destination, even the IOC) is a big problem. If I have malware beaconing to a c2 I want to investigate the device in my house….but count and no details just leaves me hanging. 

    Like
Vote10 Follow
  • 10 Votes
  • 6 mths agoLast active
  • 2Replies
  • 87Views
  • 4 Following

Need Help? We're here for you!

We're big on support, and we want to make sure you always have the best eero experience possible. Here are several resources you can use if you ever need our help!


Quick links

Community Guidelines

Help Center

Contact eero support

@eerosupport

eero.com