ESET SMART SECURITY 4 - QUICK START GUIDE FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008 Guía de usuario Pagina 80

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 124
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 79
80
4.6.1 Log files
Log files contain information about all important program events that have occurred and provide an overview of
detected threats. Logging acts as an essential tool in system analysis, threat detection and troubleshooting. Logging is
performed actively in the background with no user interaction. Information is recorded based on the current log
verbosity settings. It is possible to view text messages and logs directly from the ESET Endpoint Security environment,
as well as to archive logs.
Log files are accessible from the main program window by clicking Tools > Log files. Select the desired log type from
the Log drop-down menu. The following logs are available:
Detected threatsThe threat log offers detailed information about infiltrations detected by ESET Endpoint Security
modules. The information includes the time of detection, name of infiltration, location, the performed action and the
name of the user logged in at the time the infiltration was detected. Double-click any log entry to display its details in
a separate window.
Events All important actions performed by ESET Endpoint Security are recorded in the event log. The event log
contains information about events and errors that have occurred in the program. It is designed for system
administrators and users to solve problems. Often the information found here can help you find a solution for a
problem occurring in the program.
Computer scanResults of all completed manual or planned scans are displayed in this window. Each line
corresponds to a single computer control. Double-click any entry to view details of the respective scan.
HIPS Contains records of specific rules which were marked for recording. The protocol shows the application that
called the operation, the result (whether the rule was permitted or prohibited) and the created rule name.
Personal firewall The firewall log displays all remote attacks detected by the Personal firewall. Here you will find
information about any attacks on your computer. The Event column lists the detected attacks. The Source column tells
you more about the attacker. The Protocol column reveals the communication protocol used for the attack. Analysis
of the firewall log may help you to detect system infiltration attempts in time to prevent unauthorized access to your
system.
Antispam protection Contains records related to email messages that were marked as spam.
Web control Shows blocked or allowed URL addresses and its categories. The Action performed column tells you
Vista de pagina 79
1 2 ... 75 76 77 78 79 80 81 82 83 84 85 ... 123 124

Comentarios a estos manuales

Sin comentarios