[KB3364] Request log files from clients in ESET Remote Administrator (6.x)


ESET business product no longer supported

This content applies to an ESET product version that is currently in End of Life status and is no longer supported. This content is no longer updated. 

For a complete list of supported products and support level definitions, review the ESET End of Life policy for business products.

Upgrade ESET business products.

Are you a home user?

ESET Technical Support has requested a copy of one of the following log files:

  • Detected threats
  • Events
  • Computer scan
  • HIPS
  • Personal firewall
  • Filtered websites
  • Antispam protection
  • Web Control

If you are looking for instructions to submit a Sysinspector log, see the following Knowledgebase article:

Create a SysInspector log and submit it to ESET Technical Support for analysis



Your ESET product keeps logs of all previous scans that have been run on your computer. These scan logs are useful in determining whether previous threats have been successfully cleaned or deleted. See below for more information about each type of log file:

  • Detected threats: Detailed information about infiltrations detected by your ESET product modules
  • Events: All important actions performed by your ESET product are recorded in the event log
  • Computer scan: Results of all completed manual or planned scans
  • HIPS: A record of specific rules which were marked for recording by the user
  • Personal firewall: Displays all remote attacks on your computer detected by the Personal firewall (only in ESET Endpoint Security).
  • Filtered websites: List of websites that were blocked by Web access protection or Web Control
  • Antispam protection: Contains records related to email messages that were marked as spam
  • Web Control: Shows web pages that were blocked or allowed by Web Control, as well as how filtering rules were applied. Only in ESET Endpoint Security


 Endpoint users: Perform these steps on individual client workstations

Each ESET Remote Administrator component performs logging. ERA components write information about certain events into log files. The location of log files varies depending on the component. See the following Online Help topic for a list of log file locations for Windows, Linux, the ERA Virtual Appliance and macOS: Troubleshooting → Log files.