June 23, 2018 / by / 1 Comment

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

How To Send System Information For Analysis

Viruses are very tricky and even after the scan with reliable anti-malware you still can feel inconveniences while using computer or you don’t know how to interpret the result of the scan or the expected result is not received (full scan indicates that no threats have been found while you are sure there is a problem on the computer). In this case, our Support Center can help you.

In order to provide you with the most complete and qualified help, we need detailed information about your computer, the programs that are installed and the previous scan results.

We have compiled a set of Tools that will help you easily collect the information you need to get qualified help as quickly as possible:

Collect system information

Collect system information. Gathers all needed information about the state of your PC. We need it to analyze the actual vulnerability status of your computer. It helps to understand why some threats weren’t found or weren’t deleted, because some of them can appear on your computer not as separate files, but as running tasks and processes.

Collect system information

Log files. There are three types in the program, each collects information about specific parts of work:

Log Files

  1. Application Log. Gathers data about actions of the program, fixates information about possible problems when the program performs starting, scanning or other tasks.
  2. Application Log

  3. Protection Log is a detailed log about results of work of three real-time protection systems. If you have any suspicion of conflict in the work with other programs, while Internet Security and On-Run Protection are turned on, we see it in Protection Log.
  4. Protection Log

  5. Scan Log contains a detailed report of scan results: the scan time, its type, which objects were scanned, and what threats were detected.

Scan Log

To send us system information for analysis, go to the Tools tab, and select Collect system information. After this information will be generated. Save it on your computer by selecting Save … and send it to us for detailed analysis.

Collect system information

To send us a log file – go to the Tools tab and select the desired report type (Scan Log, Protection Log or Application Log) – check the specific log(s) and send it to us for analysis.

Also in the program settings, you can choose after how many days software stores log files. If this menu item is not checked, the log files won’t be deleted from your computer, which will very helpful in finding the cause of the problem, if it occurs.

General Settings

Related Post

How To restore quarantined files? Quarantine list is a safe place where files appear after cleaning process. Actually, they're not always became quarantined, it depends on your setting...
What Is PWS Threat And How Dangerous Is It? The PWS stands for "Password Stealer". It is primarily associated with stealing account log-in details. Some Trojan-PWS works by spying on an individu...
8 Signs Your PC Might Be a Botnet and How To Remov... Botnet attacks have been around for a long time but are becoming increasingly more sophisticated. So far in past years, there have been several high-p...
5 REASONS TO START CLEANING YOUR PC RIGHT NOW It's a tradition already trying to start a new life and making new habits on New Year. So as you GridinSoft Team sums up the results of the previou...

Matthew is a technical specialist who loves giving qualified advices and tips on GridinSoft’s products. He’s available 24/7 to assist you in any question regarding internet security.

Leave a Reply

Your email address will not be published. Required fields are marked *

Gridinsoft Products mini-guide

Categories

Recent Posts

Top Tips

Be mindful and keep your PC healthy -- GridinSoft.com

Follow Us

GridinSoft Official Offers, Coupons and FREE proposals

Related Post