Log maintenance

The logging configuration for ESET Endpoint Security for macOS is accessible from the main program window. Click Setup > Enter application preferences > Tools > Log Files. You can specify the following options for log files:

Delete old log records automatically – Log entries older than the specified number of days are automatically deleted.

Optimize log files automatically – Automatic defragmentation of log files occurs if the specified percentage of unused records is exceeded.

You can store all the relevant information displayed in the user interface, threat, and event messages in human-readable text formats such as plain text or CSV (comma-separated values) format. If you want to make these files available for processing using third-party tools, select the check box next to Enable logging to text files.

To define the target folder to which the log files are saved, click Setup next to Advanced setup.

Based on the options selected under Text Log Files: Edit, you can save logs with the following information:

Events such as Invalid username and password, Modules can not be updated, and so on are written to the eventslog.txt file.

Threats detected by the Startup scanner, Real-Time Protection, or Computer Scan are stored in the threatslog.txt file.

The results of all completed scans are saved in the format scanlog.NUMBER.txt.

Devices blocked by Device Control are mentioned in devctllog.txt.

All events related to communication through the firewall are written to firewalllog.txt.

Web pages blocked by Web control are mentioned in webctllog.txt.

To configure the filters for Default Computer Scan Log Records, click Edit and select or deselect log types as required. You can find further explanation of these log types in Log Filtering.