Network protection log
The ESET Endpoint Security network protection saves all important events in a log file, which can be viewed directly from the main menu. Click Tools > Log files and then select Network protection from the Log drop-down menu.
The log files can be used to detect errors and reveal intrusions into your system. ESET network protection logs contain the following data:
- Date and time of event
- Name of event
- Source
- Target network address
- Network communication protocol
- Rule applied, or name of worm, if identified
- Application involved
- User
A thorough analysis of this data can help detect attempts to compromise system security. Many other factors indicate potential security risks and enable you to minimize their impact: frequent connections from unknown locations, multiple attempts to establish connections, unknown applications communicating or unusual port numbers used.
Security vulnerability exploitation The message of security vulnerability exploitation is logged even if the specific vulnerability is already patched since the exploitation attempt is detected and blocked on the network level before actual exploitation could happen. |