Log files

Log files contain information about important program events that have occurred and provide an overview of detected threats. Logging is an essential part of system analysis, threat detection and troubleshooting. Logging is performed actively in the background with no user interaction. Information is recorded based on the current log verbosity settings. It is possible to view text messages and logs directly from the ESET Internet Security environment, as well as to archive logs.


Log files are accessible from the main program window by clicking Tools > More tools > Log files. Select the desired log type from the Log drop-down menu. The following logs are available:

Detections – This log offers detailed information about detections and infiltrations detected by ESET Internet Security. Log information includes the time of detection, scanner type, object type, object location, name of detection, the action taken, name of the user logged when the infiltration was detected, hash, and first occurrence. Not cleaned infiltrations are always marked with red text on a light red background. Cleaned infiltrations are marked with yellow text on white background. Not cleaned PUAs or Potentially unsafe applications are marked with yellow text on white background.

Events – All important actions performed by ESET Internet Security are recorded in the event log. The event log contains information about events and errors that have occurred in the program. It is designed for system administrators and users to solve problems. Often the information found here can help you find a solution for a problem occurring in the program.

Computer scan – Results of all completed manual or planned scans are displayed in this window. Each line corresponds to a single computer scan. Double-click any entry to view the details of the respective scan.