Comodo Help
Find the desired product help
Endpoint Manager

Endpoint Manager

Comodo Client Security 8.3

English

Print Help Download Help
Advanced Settings > General Settings > Log Settings
  • Introduction To Comodo Client Security
    • Special Features
    • System Requirements
    • Install Comodo Client Security
    • Starting Comodo Client Security
    • The Main Interface
      • The Home Screen
      • The Tasks Interface
      • The Widget
      • The System Tray Icon
    • Understanding Security Alerts
  • General Tasks – Introduction
    • Scan And Clean Your Computer
      • Run A Quick Scan
      • Run A Full Computer Scan
      • Run A Rating Scan
      • Run A Custom Scan
        • Scan A Folder
        • Scan A File
        • Create, Schedule And Run A Custom Scan
    • Instantly Scan Files And Folders
    • Processing Infected Files
    • Manage Virus Database And Program Updates
    • Manage Quarantined Items
    • View CCS Logs
      • Antivirus Logs
        • Filtering Antivirus Logs
      • Viruscope Logs
        • Filtering Viruscope Logs
      • HIPS Logs
        • Filtering HIPS Logs
      • Containment Logs
        • Filtering Containment Logs
      • Firewall Logs
        • Filtering Firewall Logs
      • Website Filtering Logs
        • Filtering Website Filtering Logs
      • Alerts Logs
        • Filtering Alerts Displayed Logs
      • Tasks
        • Filtering Tasks Launched Logs
      • File List Changes Logs
        • Filtering File List Changes Logs
      • Trusted Vendors List Changes Logs
        • Filtering Trusted Vendors List Changes Logs
      • Configuration Changes
        • Filtering Configuration Changes Logs
      • Device Control Logs
        • Filtering Device Control Logs
    • View Active Process List
    • View Active Internet Connections
  • Firewall Tasks – Introduction
    • Allow Or Block Internet Access To Applications Selectively
    • Stealth Your Computer Ports
    • Manage Network Connections
    • Stop All Network Activities
    • Advanced Firewall Settings
  • Containment Tasks - Introduction
    • Run An Application In The Container
    • Reset The Container
  • Advanced Tasks - Introduction
    • Create A Rescue Disk
      • Downloading And Burning Comodo Rescue Disk
    • Submit Files
    • Identify And Kill Unsafe Running Processes
    • Remove Deeply Hidden Malware
    • Manage CCS Tasks
  • Advanced Settings
    • General Settings
      • Customize User Interface
      • Configure Program And Virus Database Updates
      • Log Settings
      • Manage CCS Configurations
        • Comodo Preset Configurations
        • Importing/Exporting And Managing Personal Configurations
    • Security Settings
      • Antivirus Settings
        • Real-time Scanner Settings
        • Scan Profiles
        • Exclusions
      • Advanced Protection Settings
        • HIPS Behavior Settings
        • Active HIPS Rules
        • HIPS Rule Sets
        • Protected Objects
          • Protected Files
          • Blocked Files
          • Protected Registry Keys
          • Protected COM Interfaces
          • Protected Data Folders
        • HIPS Groups
          • Registry Groups
          • COM Groups
        • Comodo Containment
          • The Container - An Overview
          • Unknown Files - The Scanning Processes
        • Configuring Containment Settings
        • Configuring Rules For Auto-Containment
        • Viruscope
        • Device Control Settings
      • Firewall Settings
        • Firewall Behavior Settings
        • Application Rules
        • Global Rules
        • Firewall Rule Sets
        • Network Zones
          • Network Zones
          • Blocked Zones
        • Port Sets
        • Website Filtering
          • Creating And Modifying Website Filtering Rules
          • Defining And Modifying Website Categories
      • Manage File Rating
        • File Rating Settings
        • File Groups
        • File List
        • Trusted Files
        • Unrecognized Files
        • Submitted Files
        • Trusted Vendors List
  • Appendix 1 CCS How To... Tutorials
    • Enable / Disable AV, Firewall, Auto-Containment And Viruscope Easily
    • Set Up The Firewall For Maximum Security And Usability
    • Block Internet Access While Allowing Local Area Network (LAN) Access
    • Setting Up HIPS For Maximum Security And Usability
    • Create Rules For Auto-Containing Applications
    • Running An Instant Antivirus Scan On Selected Items
    • Creating An Antivirus Scanning Schedule
    • Run Untrusted Programs Inside The Container
    • Run Browsers Inside The Container
    • Restore Incorrectly Quarantined Item(s)
    • Submit Quarantined Items To Comodo For Analysis
    • Enable File Sharing Applications Like BitTorrent And Emule
    • Block Any Downloads Of A Specific File Type
    • Disable Auto-Containment On A Per-application Basis
    • Switch Off Automatic Antivirus And Software Updates
    • Suppressing CCS Alerts Temporarily While Playing Games
    • Control External Device Accessibility
  • Appendix 2 - Comodo Secure DNS Service
    • Router - Manually Enabling Or Disabling Comodo Secure DNS Service
    • Windows XP - Manually Enabling Or Disabling Comodo Secure DNS Service
    • Windows 7 / Vista - Manually Enabling Or Disabling Comodo Secure DNS Service
  • About Comodo Security Solutions

Log Settings

 

By default, Comodo Client Security maintains detailed logs of all Antivirus, HIPS, Containment, VirusScope and Firewall events. Logs are also created for 'Website Filtering', 'Device Control Events', 'Alerts Displayed', 'Tasks' 'File List Changes, Trusted Vendors List Changes 'and 'Configuration Changes'.

  • The 'Logging' interface allows you to specify the locations for storing log file, maximum size of the log file in local storage and how CCS should react if the maximum file size is exceeded.



     

    Logging Options
    • Write to Local Log Database(Comodo format) – Instructs CCS to store the log files in the local storage of the endpoint in Comodo format so that they can be viewed from Tasks > General Settings > View Logs interface. Refer to the section 'View Logs' for more details. The Log storage depends on the log file management settings configured in the 'Log File Management' settings area in the same interface. (Default = Enabled)
    • Write to Syslog Server(CEF Format) – Instructs CCS to forward the log files to an external Syslog Server integrated with the ITSM server that remotely manages your CCS installation. Enter the IP address/hostname of the Syslog server in the Host text field and enter the port through which Syslog server listens to ITSM in the 'Port' field. (Default = Disabled)

      • Write to remote server (JSON format) - Instructs CCS to forward the log files to HTTPS in JSON format on a remote server integrated with the ITSM server that remotely manages your CCS installation. Enter the IP address/hostname of the remote server in the Host text field and enter the port through which remote server listens to ITSM in the 'Port' field. Enter the security token to access the remote server in the Token text field. (Default = Disabled)
      • Write to Log file (CEF) Format – Instructs CCS to store the log files at a specified location in the local storage or a network storage, in Common Event Format (CEF) format, also known as NCSA Common Log Format, which is standardized text file format. When selecting this option, click 'Browse', select the storage location and navigate to the log file to which the logs are to be added. (Default = Disabled)
      • Write to Windows Event Logs – Instructs CCS to store the log events to the Windows Event Logs. (Default = Enabled)

      Log File Management

      • If the log file's size exceeds (Mb) - Enables you to specify behavior when the Local Log Database (Comodo Format) log file reaches a certain size. You can decide on whether to maintain log files of larger sizes or to discard them depending on your future reference needs and the storage capacity of your hard drive.
      • Specify the maximum limit for the log file size (in MB) in the text box beside 'If the log file's size exceeds (MB)'. (Default = 100MB)

      If you want to discard the log file if it reaches the maximum size, select 'Delete it and create a new one'. Once the log file reaches the specified maximum size, it will be automatically deleted from your system and a new log file will be created with the log of events occurring from that instant. (Default = Enabled)

      If you want to save the log file even if it reaches the maximum size, select 'Move it to' and select a destination folder for the log file. (Default = Disabled)


       


      The selected folder path will appear beside 'Move it to'.

       



      Once the log file reaches the maximum size, it will be automatically moved to the selected folder and a new log file will be created with the log of events occurring from that instant.


      User Statistics

      • Send anonymous program usage statistics to Comodo - Comodo collects the usage details from millions of CCS users to analyze their usage statistics (e.g. clicks, crashes, errors etc) to Comdo in order to improve the product's quality - for the continual enhancement of the product. Your CCS installation will collect details on how you use the application and send them periodically to Comodo servers through a secure and encrypted channel. Also your privacy is protected as this data is sent anonymous. This data will be useful to the engineers and developers at Comodo to identify the areas to be developed further for delivering the best Internet Security product. Disable this option if you do not want your usage details to be sent to Comodo. (Default = Disabled)

      Our Products
      • Free Antivirus
      • Free Internet Security
      • Website Malware Removal
      • Free Anti-Malware
      • Anti-Spam (Free Trial)
      • Windows Antivirus
      • Antivirus for Windows 7
      • Antivirus for Windows 8
      • Antivirus for Windows 10
      • Antivirus for MAC
      • Antivirus for Linux
      • Free Endpoint Security
      • Free ModSecurity
      • Free RMM
      • Free Website Malware Scanner
      • Free Device Manager for Android
      • Free Demo
      • Network Security
      • Endpoint Protection
      • Antivirus for Android
      • Comodo Antivirus
      • Wordpress Security
      Cheap CDN
      • Bootstrap CDN
      • Semantic UI CDN
      • Jquery CDN
      • CDN Plans
      • CDN
      • Free CDN
      Enterprise
      • Patch Management Software
      • Patch Manager
      • Service Desk
      • Website Down
      • Endpoint Protection Solutions
      • Website Security Check
      • Remote Monitoring and Management
      • Website Security
      • Device Manager
      • ITSM
      • CRM
      • MSP
      • Android Device Manager
      • MDR Services
      • Managed IT Support Services
      • Free EDR
      Free SSL Certificate
      Support Partners Terms and Conditions Privacy Policy

      © Comodo Group, Inc. 2025. All rights reserved.