Log files

Log files contain information about important program events that have occurred and provide an overview of detected threats. Logging is an essential part of system analysis, threat detection and troubleshooting. Logging is performed actively in the background with no user interaction. Information is recorded based on the current log verbosity settings. It is possible to view text messages and logs directly from the ESET Smart Security Premium environment, as well as to archive logs.

Log files are accessible from the main program window by clicking Tools > More tools > Log files. Select the desired log type from the Log drop-down menu. The following logs are available:

Detections – This log offers detailed information about detections and infiltrations detected by ESET Smart Security Premium. Log information includes the time of detection, name of detection, location, the action taken and the name of the user logged in at the time the infiltration was detected. Double-click any log entry to display its details in a separate window. Not cleaned infiltrations are always marked with red text on a light red background, cleaned infiltrations are marked with yellow text on white background. Not cleaned PUAs or Potentially unsafe applications are marked with yellow text on white background.

Events – All important actions performed by ESET Smart Security Premium are recorded in the event log. The event log contains information about events and errors that have occurred in the program. It is designed for system administrators and users to solve problems. Often the information found here can help you find a solution for a problem occurring in the program.

Computer scan – Results of all completed manual or planned scans are displayed in this window. Each line corresponds to a single computer control. Double-click any entry to view the details of the respective scan.

HIPS – Contains records of specific HIPS rules which are marked for recording. The protocol shows the application that triggered the operation, the result (whether the rule was permitted or prohibited) and the rule name.

Network protection – The network protection log displays all remote attacks detected by the Firewall. Here you will find information about any attack on your computer. The Event column lists detected attacks. The Source column tells you more about the attacker. The Protocol column reveals the communication protocol used for the attack. Analysis of the network protection log may help you to detect system infiltration attempts in time to prevent unauthorized access to your system. For more details on network attacks, see IDS and advanced options.

Filtered websites – This list is useful if you want to view a list of websites that were blocked by Web access protection or Parental control. Each log includes time, URL address, user and application that created a connection to a particular website.

Antispam protection – Contains records related to email messages that were marked as spam.

Parental control – Shows web pages blocked or allowed by Parental control. The Match type and Match values columns tell you how filtering rules were applied.

Device control – Contains records of removable media or devices that were connected to the computer. Only devices with respective Device control rules will be recorded to the log file. If the rule does not match a connected device, a log entry for a connected device will not be created. You can also view details such as device type, serial number, vendor name and media size (if available).

Webcam protection – Contains records about applications blocked by Webcam protection.

Select the contents of any log and press Ctrl + C to copy it to the clipboard. Hold Ctrl or Shift to select multiple entries.

Click MODULE_INACTIVE Filtering to open the Log filtering window where you can define filtering criteria.

Right-click a specific record to open the context menu. The following options are available in the context menu:

Show Shows more detailed information about the selected log in a new window.

Filter same records – After activating this filter, you will only see records of the same type (diagnostics, warnings, ...).

Filter... – After clicking this option, the Log filtering window will allow you to define filtering criteria for specific log entries.

Enable filter – Activates filter settings.

Disable filter – Clears all filter settings (as described above).

Copy/Copy all – Copies information about all the records in the window.

Delete/Delete all – Deletes the selected record(s) or all the records displayed – this action requires administrator privileges.

Export... – Exports information about the record(s) in XML format.

Export all... – Export information about all records in XML format.

Find/Find next/Find previous – After clicking this option, the Log filtering window will allow you to define filtering criteria for specific log entries.