Issue
ESET Technical Support has requested a copy of one of the following log files:
- Detected threats
- Events
- Computer scan
- HIPS
- Personal firewall
- Filtered websites
- Antispam protection
- Web Control
If you are looking for instructions to submit a Sysinspector log, see the following Knowledgebase article:
Create a SysInspector log and submit it to ESET Technical Support for analysis
Details
Your ESET product keeps logs of all previous scans that have been run on your computer. These scan logs are useful in determining whether previous threats have been successfully cleaned or deleted. See below for more information about each type of log file:
- Detected threats: Detailed information about infiltrations detected by your ESET product modules
- Events: All important actions performed by your ESET product are recorded in the event log
- Computer scan: Results of all completed manual or planned scans
- HIPS: A record of specific rules which were marked for recording by the user
- Personal firewall: Displays all remote attacks on your computer detected by the Personal firewall (only in ESET Endpoint Security).
- Filtered websites: List of websites that were blocked by Web access protection or Web Control
- Antispam protection: Contains records related to email messages that were marked as spam
- Web Control: Shows web pages that were blocked or allowed by Web Control, as well as how filtering rules were applied. Only in ESET Endpoint Security
Solution
Endpoint users: Perform these steps on individual client workstations
Each ESET Remote Administrator component performs logging. ERA components write information about certain events into log files. The location of log files varies depending on the component. See the following Online Help topic for a list of log file locations for Windows, Linux, the ERA Virtual Appliance and macOS: Troubleshooting → Log files.