Log Files; Log Maintenance; User Interface - ESET SMART SECURITY User Manual

Integrated components: nod32 antivirus, antispyware, personal firewall, antispam
Hide thumbs Also See for SMART SECURITY:
Table of Contents

Advertisement

send the file to ESET's virus lab. To submit a file from quarantine,
right‑click the file and select Submit for analysis from the context
menu.
4.7

Log files

The Logs files contain information about all important program
events that have occurred and provide an overview of detected
threats. Logging acts as an essential tool in system analysis, threat
detection and troubleshooting. Logging is performed actively in
the background with no user interaction. Information is recorded
based on the current log verbosity settings. It is possible to view
text messages and logs directly from the ESET Smart Security
environment, as well as to archive logs.
Log files are accessible from the main ESET Smart Security window
by clicking Tools > Log files. Select the desired log type using the Log:
drop‑down menu at the top of the window. The following logs are
available:
1.
Detected threats – Use this option to view all information about
events related to the detection of infiltrations.
2. Events – This option is designed for system administrators and
users to solve problems. All important actions performed by ESET
Smart Security are recorded in the Event logs.
3. On‑demand computer scan – Results of all completed scans are
displayed in this window. Double‑click on any entry to view details
of the respective On‑demand scan.
28
4. ESET Personal firewall log – Contains records of all facts detected
by and related to the Personal firewall. Analysis of the firewall
log may help to detect system penetration attempts in time to
prevent unauthorized access to your system.
In each section, the displayed information can be directly copied to
the clipboard by selecting the entry and clicking the Copy button. To
select multiple entries, the CTRL and SHIFT keys can be used.
4.7.1

Log maintenance

The Logging configuration of ESET Smart Security is accessible from
the main program window. Click Setup > Enter entire advanced
setup tree... > Tools > Log files. You can specify the following options
for log files:
Delete records automatically: Log entries older than the
specified number of days are automatically deleted
Optimize log files automatically: Enables automatic
defragmentation of log files if the specified percentage of unused
records has been exceeded
Minimum logging verbosity: Specifies the logging verbosity level.
Available options:
Critical errors – Logs only critical errors (error starting
Antivirus protection, Personal firewall, etc...)
Errors – Only "Error downloading file" messages are recorded,
plus critical errors
Warnings – Records critical errors and warning messages
Informative records – Records informative messages
including successful update messages plus all records above
Diagnostic records – Logs information needed for fine‑tuning
of the program and all records above

4.8 User interface

The user interface configuration options in ESET Smart Security can
be modified so that you can adjust the working environment to fit
your needs. These configuration options are accessible from the User
interface branch of the ESET Smart Security Advanced Setup tree.
The User interface elements section gives users the ability to toggle
to Advanced mode if desired. Advanced mode displays more detailed
settings and additional controls to ESET Smart Security.
The Graphical user interface option should be disabled if the
graphical elements slow the performance of the computer, or cause
other problems. The graphical interface may also need to be turned off

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SMART SECURITY and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Table of Contents