Log files

Log files contain information about important program events that have occurred and provide an overview of detected threats. Logging is an essential part of system analysis, threat detection and troubleshooting. Logging is performed actively in the background with no user interaction. Information is recorded based on the current log verbosity settings. It is possible to view text messages and logs directly from the ESET Internet Security environment, as well as to archive logs.

Log files are accessible from the main program window by clicking Tools > More tools > Log files. Select the desired log type from the Log drop-down menu. The following logs are available:

Detected threats – The threat log offers detailed information about infiltrations detected by ESET Internet Security . Log information includes the time of detection, name of infiltration, location, the action taken and the name of the user logged in at the time the infiltration was detected. Double-click any log entry to display its details in a separate window.

Events – All important actions performed by ESET Internet Security are recorded in the event log. The event log contains information about events and errors that have occurred in the program. It is designed for system administrators and users to solve problems. Often the information found here can help you find a solution for a problem occurring in the program.

Computer scan – Results of all completed manual or planned scans are displayed in this window. Each line corresponds to a single computer control. Double-click any entry to view the details of the respective scan.

HIPS – Contains records of specific HIPS rules which are marked for recording. The protocol shows the application that triggered the operation, the result (whether the rule was permitted or prohibited) and the rule name.

Personal firewall – The firewall log displays all remote attacks detected by the Personal firewall. Here you will find information about any attack on your computer. The Event column lists detected attacks. The Source column tells you more about the attacker. The Protocol column reveals the communication protocol used for the attack. Analysis of the firewall log may help you to detect system infiltration attempts in time to prevent unauthorized access to your system.

Filtered websites – This list is useful if you want to view a list of websites that were blocked by Web access protection or Parental control. Each log includes time, URL address, user and application that created a connection to a particular website.

Antispam protection – Contains records related to email messages that were marked as spam.

Parental control – Shows web pages blocked or allowed by Parental control. The Match type and Match values columns tell you how filtering rules were applied.

Device control – Contains records of removable media or devices that were connected to the computer. Only devices with respective Device control rules will be recorded to the log file. If the rule does not match a connected device, a log entry for a connected device will not be created. You can also view details such as device type, serial number, vendor name and media size (if available).

Webcam protection – Contains records about applications blocked by Webcam protection.

Select the contents of any log and press Ctrl + C to copy it to the clipboard . Hold Ctrl and Shift to select multiple entries.

Click MODULE_INACTIVE Filtering to open the Log filtering window where you can define filtering criteria.

Right-click a specific record to open the context menu. The following options are available in the context menu:

Show Shows more detailed information about the selected log in a new window.

Filter same records – After activating this filter, you will only see records of the same type (diagnostics, warnings, ...).

Filter.../Find... – After clicking this option, the Search in log window will allow you to define filtering criteria for specific log entries.

Enable filter – Activates filter settings.

Disable filter – Clears all filter settings (as described above).

Copy/Copy all – Copies information about all the records in the window.

Delete/Delete all – Deletes the selected record(s) or all the records displayed – this action requires administrator privileges.

Export... – Exports information about the record(s) in XML format.

Export all... – Export information about all records in XML format.

Scroll log – Leave this option enabled to auto scroll old logs and view active logs in the Log files window.