ESET Online Help

Search English
Select the topic

Log Files

The log files contain information about important program events and provide an overview of detected threats. Logging is essential for system analysis, threat detection and troubleshooting. Logging is actively performed in the background with no user interaction. Information is recorded based on current log verbosity settings. You can view text messages and logs directly from the ESET Endpoint Security environment and archive logs.

Log files are accessible from the ESET Endpoint Security main menu by clicking Tools > Log files. Select the desired log type using the drop-down menu at the top right side of the window. The following logs are available:

Detections—Displays all information about events related to infiltration detections.

Computer scan—Shows results of all completed scans; double-click any entry to view details for the respective On-demand computer scan

Events—Helps system administrators and users solve problems; all important actions performed by ESET Endpoint Security are recorded in event logs.

Blocked files—Contains records of files blocked during a scan based on list of blocked files (blocked hashes) configured by ESET Inspect.

Filtered websites—Shows a list of websites that Web access protection blocked. In these logs you can see the time, URL, status, IP address, user and app that opened a connection to a specific website.

Sent files—Contains records of the samples sent for analysis.

logs