![]() Sent files – Contains records of files that were sent to ESET LiveGrid® or ESET LiveGuard for analysis.For more information, please see the ESET Enterprise Inspector Online user guide. The protocol shows the reason and the source module that blocked the file, as well as the application and user that executed the file. Blocked files – Contains records of blocked files that could not be accessible when connected to ESET Enterprise Inspector.Double-click any entry to view the details of the respective scan. Each line corresponds to a single computer control. Computer scan – All scan results are displayed in this window. ![]() Often the information found here can help you find a solution for a problem occurring in the program. It is designed to help system administrators and users resolve problems. The event log contains information about events and errors that have occurred in the program. Events – All important actions performed by ESET Endpoint Security are recorded in the event log.Not-cleaned PUAs or Potentially unsafe applications are marked with yellow text on white background. Not-cleaned infiltrations are always marked with red text on light red background, cleaned infiltrations are marked with yellow text on white background. Double-click any log entry to display its details in a separate window. The information includes the time of detection, name of detection, location, the performed action and the name of the user logged in at the time the infiltration was detected. Detections – This log offers detailed information about detections and infiltrations detected by ESET Endpoint Security modules.Select the desired log type from the Log drop-down menu. Log files are accessible from the main program window by clicking Tools > Log files. It is also possible to archive log files. ![]() It is possible to view text messages and logs directly from the ESET Endpoint Security environment. Information is recorded based on the current log verbosity settings. Logging is performed actively in the background with no user interaction. ![]() Logs are an essential tool in system analysis, threat detection and troubleshooting. Log files contain information about all important program events that have occurred and provide an overview of detected threats.
0 Comments
Leave a Reply. |