User guide
70
Submit file for analysis – Allows you to submit a suspicious file for analysis to the ESET Virus Lab. The dialog window
displayed after clicking this option is described in the Submission of files for analysis section.
ESET SysRescue – Launches the ESET SysRescue creation wizard.
Note: ESET SysRescue is currently not available in ESET Smart Security version 6. We recommend that you create an
ESET SysRescue disk on another version of Microsoft Windows or with ESET products version 5.x.
ESET Social Media Scanner – Link to a social media application (e.g. Facebook) intended to protect social media users
against threats. This application is independent from other ESET products and is completely free.
4.6.1 Log files
Log files contain information about all important program events that have occurred and provide an overview of
detected threats. Logging is an essential part of system analysis, threat detection and troubleshooting. Logging is
performed actively in the background with no user interaction. Information is recorded based on the current log
verbosity settings. It is possible to view text messages and logs directly from the ESET Smart Security environment, as
well as to archive logs.
Log files are accessible from the main program window by clicking Tools > Log files. Select the desired log type from
the Log drop-down menu. The following logs are available:
Detected threats – The threat log offers detailed information about infiltrations detected by ESET Smart Security
modules. The information includes the time of detection, name of infiltration, location, the performed action and the
name of the user logged in at the time the infiltration was detected. Double-click any log entry to display its details in
a separate window.
Events – All important actions performed by ESET Smart Security are recorded in the event log. The event log
contains information about events and errors that have occurred in the program. It is designed for system
administrators and users to solve problems. Often the information found here can help you find a solution for a
problem occurring in the program.
Computer scan – Results of all completed manual or planned scans are displayed in this window. Each line
corresponds to a single computer control. Double-click any entry to view details of the respective scan.
HIPS – Contains records of specific HIPS rules which were marked for recording. The protocol shows the application
that triggered the operation, the result (whether the rule was permitted or prohibited) and the created rule name.
Personal firewall – The firewall log displays all remote attacks detected by the Personal firewall. Here you will find
information about any attacks on your computer. The Event column lists the detected attacks. The Source column tells
you more about the attacker. The Protocol column reveals the communication protocol used for the attack. Analysis
of the firewall log may help you to detect system infiltration attempts in time to prevent unauthorized access to your
system.
Filtered websites – This list is useful if you wish to view a list of websites that were blocked by Web access protection
or Parental control. In these logs you can see time, URL address, user and application which created a connection to
the particular website.
Antispam protection – Contains records related to email messages that were marked as spam.
Parental control – Shows web pages blocked or allowed by Parental control. The Match type and Match values
columns tell you how the filtering rules were applied.
In each section, the displayed information can be directly copied to the clipboard (keyboard shortcut Ctrl + C) by
selecting the entry and clicking Copy. To select multiple entries, the CTRL and SHIFT keys can be used.
You can show the context menu by right-clicking a specific entry. The following options are available in the context
menu:
Filter records of the same type – After activating this filter, you will only see records of the same type (diagnostics,
warnings, ...).
Filter.../Find... – After clicking this option, a Log filtering window will pop up where you can define the filtering
criteria.
Disable filter – Clears all filter settings (as described above).
Copy all – Copies information about all the records in the window.
Delete/Delete all – Deletes the selected record(s) or all the records displayed – this action requires administrator
privileges.
Export – Exports information about the record(s) in XML format.
Scroll log – Leave this option enabled to auto scroll old logs and watch active logs in the Log files window.










