Log files

The Log files contain information about important program events that have occurred and provides an overview of detected threats. Logging acts as an essential tool in system analysis, threat detection and troubleshooting. Logging is performed actively in the background with no user interaction. Information is recorded based on current log verbosity settings. It is possible to view text messages and logs directly from the ESET Cyber Security Pro environment, as well as to archive logs.

Log files are accessible from the ESET Cyber Security Pro main menu by clicking Tools > Logs. Select the desired log type using the Log drop-down menu at the top of the window. The following logs are available:

1.Detected threats – use this option to view all information about events related to the detection of infiltrations.

2.Events – this option is designed to help system administrators and users solve problems. All important actions performed by ESET Cyber Security Pro are recorded in the Event logs.

3.Computer scan – results of all completed scans are displayed in this log. Double-click any entry to view details for the respective On-demand computer scan.

4.Parental – list of all web pages blocked by Parental control.

5.Firewall – this log contains the results of all network-related events.

6.Filtered websites – this list is useful if you want to view a list of websites that were blocked by Web access protection. In these logs you can see the time, URL, status, IP address, user and application that opened a connection to the particular website.

In each section, the displayed information can be directly copied to the clipboard by selecting the entry and clicking on the Copy button.