ESET Online Help

Search English
Select the topic

Network protection log

The ESET Smart Security Premium network protection saves all important events in a log file, which can be viewed directly from the main menu. Click Tools > Log files and then select Network protection from the Log drop-down menu.

The log files can be used to detect errors and reveal intrusions into your system. ESET network protection logs contain the following data:

Date and time of event

Name of event


Target network address

Network communication protocol

Rule applied, or name of worm, if identified

Application involved


A thorough analysis of this data can help detect attempts to compromise system security. Many other factors indicate potential security risks and enable you to minimize their impact: frequent connections from unknown locations, multiple attempts to establish connections, unknown applications communicating or unusual port numbers used.


Security vulnerability exploitation

The message of security vulnerability exploitation is logged even if the specific vulnerability is already patched since the exploitation attempt is detected and blocked on the network level before actual exploitation could happen.