# View and download Script Emulation Logs

The user can download a Script Emulation Logs (results) in this section. This log has what the script performed. It is important to emphasize that the Script should have a result on the console. This result is what is presented on the logs.&#x20;

To download all the Logs of an Emulation, follow these steps:&#x20;

1. In the Custom Threat Validation Table, emulations view click on the <mark style="color:orange;">"Report”</mark>  button corresponding to the desired Emulation in the Reports column.&#x20;
2. Click on the button found in the section <mark style="color:orange;">“Download All Logs.”</mark>&#x20;
3. The Platform will generate a .zip file with all the logs in the emulation. Save this .zip file.&#x20;

To download the Logs of all Scripts Emulation on a specific endpoint , follow these steps:&#x20;

1. In the Custom Threat Validation Table, emulations view click on the <mark style="color:orange;">"Report"</mark> button corresponding to the desired Emulation in the Reports column.&#x20;
2. Click on the <mark style="color:orange;">“Endpoint Logs in Zip”</mark> button at the right side of the endpoint’s name on the Endpoints Scripts Emulation.&#x20;
3. The Platform will generate a .zip file with all the logs in the emulation. Save this .zip file.&#x20;

To download the Logs of a specific Script Emulation, follow these steps:&#x20;

1. In the Custom Threat Validation Table, emulations view click on the <mark style="color:orange;">"Report"</mark>  button corresponding to the desired Emulation in the Reports column.&#x20;
2. Click on the ![](data:image/png;base64,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) button in the Actions Column of the Script used in the emulation in the Endpoints Scripts Emulation Section.&#x20;
3. The Platform will generate a .zip file with all the logs in the emulation. Save this .zip file.&#x20;

To View the Logs of a specific Script Emulation, follow these steps:&#x20;

1. In the Custom Threat Validation Table, emulations view click on the <mark style="color:orange;">"Report"</mark> button corresponding to the desired Emulation in the Reports column.&#x20;
2. Click on the ![Ojo con relleno sólido](data:image/png;base64,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) button in the Actions Column of the Script used in the emulation in the Endpoints Scripts Emulation section.&#x20;
3. A window will appear with the log of the emulation. By default, is presented:&#x20;
4. Script Name&#x20;
5. Hostname&#x20;
6. Output (logs) If the script failed, some information will be presented here. This is related to the Language interpreter not EVE.&#x20;
