Log files

The log files contain information about important program events and provide an overview of detected threats. Logging is essential for system analysis, threat detection, and troubleshooting. Logging is performed actively in the background with no user interaction. Information is recorded based on current log verbosity settings. You can view text messages and logs directly from the ESET Cyber Security environment, and you can archive logs.

Log files are accessible from the ESET Cyber Security main menu by clicking Tools > Logs. Select the desired log type using the Log drop-down menu at the top of the window. The following logs are available:

Detected threats – Use this option to view all information about events related to the detection of infiltrations.

Events – This option is designed to help system administrators and users solve problems. All important actions performed by ESET Cyber Security are recorded in event logs.

Computer scan – The results of all completed scans are displayed in this log. Double-click any entry to view details for the respective on-demand computer scan.

Filtered websites – Use this option to view a list of web sites that were blocked by Web access protection. In these logs you can see the time, URL, status, IP address, user, and application that opened a connection to a particular web site.

In each section, you can copy displayed information directly to the clipboard by selecting the entry and clicking Copy.