Log maintenance

The logging configuration for ESET Cyber Security is accessible from the main program window. Click Setup > Enter application preferences (or press cmd+,) > Log Files. You can specify the following options for log files:

Delete old log records automatically - log entries older than the specified number of days are automatically deleted (90 days by default)

Optimize log files automatically - enables automatic defragmentation of log files if the specified percentage of unused records has been exceeded (25% by default)

All the relevant information displayed in the graphic user interface, threat and event messages can be stored in human readable text formats such as plain text or CSV (Comma-separated values). If you want to make these files available for processing using third-party tools, select the check box next to Enable logging to text files.

To define the target folder to which the log files will be saved, click Setup next to Advanced Options.

Based on the options selected under Text Log Files: Edit, you can save logs with the following information written:

Events such as Invalid username and password, Modules can not be updated etc. are written to the eventslog.txt file

Threats detected by the Startup scanner, Real-Time Protection or Computer Scan are stored in the file named threatslog.txt

The results of all completed scans are saved in the format scanlog.NUMBER.txt

To configure the filters for Default Computer Scan Log Records, click Edit and select/deselect log types as required. Further explanation to these log types can be found in Log Filtering.