1 security equipment log audit 2 server log audit 3 virus log audit 4 virus database update 5 high-risk virus emergency treatment
6 vulnerability scanning 7 deep threat detection 8 security event audit 9 wireless security audit 10 security hardening