ESET SMART SECURITY Guía de usuario Pagina 32

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 46
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 31
32
4.7 Log files
The Log files contain information about all important program events
that have occurred and provide an overview of detected threats.
Logging acts as an essential tool in system analysis, threat detection
and troubleshooting. Logging is performed actively in the background
with no user interaction. Information is recorded based on the current
log verbosity settings. It is possible to view text messages and logs
directly from the ESET Smart Security environment, as well as to
archive logs.
Log files are accessible from the main menu by clicking Tools > Log
files. Select the desired log type using the Log: drop‑down menu at
the top of the window. The following logs are available:
1. Detected threats Use this option to view all information about
events related to the detection of infiltrations.
2. Events This option is designed for system administrators and
users to solve problems. All important actions performed by ESET
Smart Security are recorded in the Event logs.
3. On‑demand computer scan Results of all completed scans are
displayed in this window. Double‑click any entry to view details of
the respective On‑demand scan.
4. ESET Personal firewall log Contains records of all
communication detected by and related to the Personal firewall.
Analysis of the firewall log may help to detect system infiltration
attempts in time to prevent unauthorized access to your system.
In each section, the displayed information can be directly copied to
the clipboard by selecting the entry and clicking the Copy button. To
select multiple entries, the CTRL and SHIFT keys can be used.
4.7.1 Log maintenance
The Logging configuration of ESET Smart Security is accessible from
the main program window. Click Setup > Enter entire advanced
setup tree... > Tools > Log files. You can specify the following options
for log files:
Delete records automatically: Log entries older than the
specified number of days are automatically deleted
Optimize log files automatically: Enables automatic
defragmentation of log files if the specified percentage of unused
records has been exceeded
Minimum logging verbosity: Specifies the logging verbosity level.
Available options:
Diagnostic records – Logs information needed for fine‑tuning
of the program and all records above
Informative records – Records informative messages
including successful update messages plus all records above
Warnings – Records critical errors and warning messages
Errors – Only “Error downloading file” messages are recorded,
plus critical errors
Critical warnings – Logs only critical errors (error starting
Antivirus protection, Personal firewall, etc…)
4.8 User interface
The user interface configuration options in ESET Smart Security
allow you to adjust the working environment to fit your needs. These
configuration options are accessible from the User interface branch
of the ESET Smart Security Advanced Setup tree.
In the User interface elements section, the Advanced mode option
gives users the ability to allow toggling to Advanced mode. Advanced
mode displays more detailed settings and additional controls to ESET
Smart Security.
The Graphical user interface option should be disabled if the
graphical elements slow the performance of your computer or cause
other problems. The graphical interface may also need to be turned o
for visually impaired users, as it may conflict with special applications
that are used for reading text displayed on the screen.
If you wish to deactivate the ESET Smart Security splash‑screen,
deselect the Show splash‑screen at startup option.
Vista de pagina 31
1 2 ... 27 28 29 30 31 32 33 34 35 36 37 ... 45 46

Comentarios a estos manuales

Sin comentarios