Log maintenance
The logging configuration for ESET Cyber Security Pro is accessible from the main program window. Click Setup > Enter application preferences (or press cmd+,) > Log Files. You can specify the following options for log files:
•Delete old log records automatically - Log entries older than the specified number of days are automatically deleted (90 days by default).
•Optimize log files automatically - Automatic defragmentation of log files occurs if the specified percentage of unused records is exceeded (25% by default).
You can store all the relevant information displayed in the user interface, threat, and event messages in as plain text or CSV (Comma-separated values) format. To make these files available for processing using third-party tools, select the check box next to Enable logging to text files.
To define the target folder to which log files are saved, click Setup next to Advanced Options.
Based on the options selected under Text Log Files: Edit, you can save logs with the following information:
•Events such as Invalid username and password, Modules can not be updated, and so on are written to the eventslog.txt file.
•Threats detected by the Startup scanner, Real-Time Protection, or Computer Scan are stored in the threatslog.txt file.
•The results of all completed scans are saved in the format scanlog.NUMBER.txt.
•All events related to communication through the Firewall are written to firewalllog.txt.
To configure the filters for Default Computer Scan Log Records, click Edit and select or deselect log types as required. More explanation about these log types is in Log Filtering.