June 23, 2018 / by / No Comments

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

How To Send System Information For Analysis

Viruses are very tricky and even after the scan with reliable anti-malware you still can feel inconveniences while using computer or you don’t know how to interpret the result of the scan or the expected result is not received (full scan indicates that no threats have been found while you are sure there is a problem on the computer). In this case, our Support Center can help you.

In order to provide you with the most complete and qualified help, we need detailed information about your computer, the programs that are installed and the previous scan results.

We have compiled a set of Tools that will help you easily collect the information you need to get qualified help as quickly as possible:

Collect system information

Collect system information. Gathers all needed information about the state of your PC. We need it to analyze the actual vulnerability status of your computer. It helps to understand why some threats weren’t found or weren’t deleted, because some of them can appear on your computer not as separate files, but as running tasks and processes.

Collect system information

Log files. There are three types in the program, each collects information about specific parts of work:

Log Files

  1. Application Log. Gathers data about actions of the program, fixates information about possible problems when the program performs starting, scanning or other tasks.
  2. Application Log

  3. Protection Log is a detailed log about results of work of three real-time protection systems. If you have any suspicion of conflict in the work with other programs, while Internet Security and On-Run Protection are turned on, we see it in Protection Log.
  4. Protection Log

  5. Scan Log contains a detailed report of scan results: the scan time, its type, which objects were scanned, and what threats were detected.

Scan Log

To send us system information for analysis, go to the Tools tab, and select Collect system information. After this information will be generated. Save it on your computer by selecting Save … and send it to us for detailed analysis.

Collect system information

To send us a log file – go to the Tools tab and select the desired report type (Scan Log, Protection Log or Application Log) – check the specific log(s) and send it to us for analysis.

Also in the program settings, you can choose after how many days software stores log files. If this menu item is not checked, the log files won’t be deleted from your computer, which will very helpful in finding the cause of the problem, if it occurs.

General Settings

Matthew is a technical specialist who loves giving qualified advices and tips on GridinSoft’s products. He’s available 24/7 to assist you in any question regarding internet security.

Related Post

Happy Halloween everyone! Happy Halloween everyone!In the scarrrriest day of the year, we give you only treats, no tricks. How we do this? No virus will trick you with our...
Facebook gives US lawmakers the names of 52 firms ... Facebook finally responses to 2000 questions from US lawmakers and answers are quite interesting! Last month the New York Times revealed that Faceboo...
BEST EMAIL SECURITY TACTICS TO STAY SAFE It has been almost two decades or maybe a little more than that since email has entered the world of internet. Email boosted up the communication game...
Unknown Google tricks for better searching Google Chrome is considered to be one of the most used browsers on the internet. It was introduced by Google in 2008, and it has grown to become the m...

Leave a Reply

Your email address will not be published. Required fields are marked *

Gridinsoft Products mini-guide

Categories

Recent Posts

Top Tips

Be mindful and keep your PC healthy -- GridinSoft.com

Follow Us

GridinSoft Official Offers, Coupons and FREE proposals

Related Post