14
Figure 6-1: Update settings
Figure 6-2: Downloading updates
NOTE:
To prevent unnecessary bandwidth usage, virus
signature database updates are issued as needed,
when a new threat occurs. While virus signature
database updates are free with your active license, you
may be charged by your mobile service provider for
data transfers. Please check with your mobile service
provider. You can also update the virus signature
database using your computer (see section 6, “Update“)
7. Viewing Logs and statistics
The
Choose log
section (
Menu > View > Logs
) stores
all file scan results and scan status reports, along with
information about locked and infected files. Logs are
created when a scan is initiated or when an infiltration
is detected. All infected files are highlighted in red. At
the end of each log entry is the reason why the file is
included in the log.
System logs contain the following information:
•
Time
– Date and time of the event
•
Log name
– Log file name (usually in the form
EsetAV_log_number.log)
• Scanned files
• Actions performed or errors encountered during the
scan
Figure 7-1: Opening scan log
Figure 7-2: Choose log