User Manual
14
To disable system tray notifications after each successful
update, select Do not display notification about successful
update.
To delete all temporarily stored update data, click Clear next
to Clear Update Cache. Use this option if you are experiencing
difficulty while updating.
8.2 How to create update tasks
Updates can be triggered manually by clicking Update from
the main menu and then clicking Update virus signature
database.
Updates can also be run as scheduled tasks. To configure a
scheduled task, click Tools > Scheduler. By default, the
following tasks are activated in ESET Cyber Security:
Regular automatic update
Automatic update after user logon
Each of the update tasks can be modified to meet your needs.
In addition to the default update tasks, you can create new
update tasks with a user-defined configuration. For more
details about creating and configuring update tasks, see the
Scheduler section.
8.3 Upgrading ESET Cyber Security to a new version
For maximum protection, it is important to use the latest build
of ESET Cyber Security. To check for a new version, click Home
from the main menu. If a new build is available, a message will
be displayed. Click Learn more... to display a new window
containing the version number of the new build and the
changelog.
Click Yes to download the latest build or click Not now to close
the window and download the upgrade later.
If you click Yes, the file will be downloaded to your downloads
folder (or the default folder set by your browser). When the
file has finished downloading, launch the file and follow the
installation directions. Your Username and Password will be
automatically transferred to the new installation. We
recommend that you check for upgrades regularly, especially
when installing ESET Cyber Security from a CD or DVD.
9. Tools
The Tools menu includes modules that help simplify program
administration and offer additional options for advanced
users.
9.1 Log files
The Log files contain information about important program
events that have occurred and provides an overview of
detected threats. Logging acts as an essential tool in system
analysis, threat detection and troubleshooting. Logging is
performed actively in the background with no user interaction.
Information is recorded based on current log verbosity
settings. It is possible to view text messages and logs directly
from the ESET Cyber Security environment, as well as to
archive logs.
Log files are accessible from the ESET Cyber Security main
menu by clicking Tools > Logs. Select the desired log type
using the Log drop-down menu at the top of the window. The
following logs are available:
1. Detected threats – use this option to view all information
about events related to the detection of infiltrations.
2. Events – this option is designed to help system
administrators and users solve problems. All important
actions performed by ESET Cyber Security are recorded in
the Event logs.
3. Computer scan – results of all completed scans are
displayed in this log. Double-click any entry to view details
for the respective On-demand computer scan.
In each section, the displayed information can be directly
copied to the clipboard by selecting the entry and clicking on
the Copy button.
9.1.1 Log maintenance
The logging configuration for ESET Cyber Security is accessible
from the main program window. Click Setup > Enter
application preferences ... (or press
cmd-,
) > Log Files. You
can specify the following options for log files:
Delete old log records automatically - log entries older than
the specified number of days are automatically deleted.
Optimize log files automatically - enables automatic
defragmentation of log files if the specified percentage of
unused records has been exceeded.
To configure the Computer Scan Log Records Default Filter
click Edit... and select/deselect log types as required.
9.1.2 Log filtering
Logs store information about important system events. The
log filtering feature allows you to display records about a
specific type of event.
The most frequently used log types are listed below:
Critical warnings – critical system errors (e.g., Antivirus
protection failed to start)
15