How to manage Endpoint products from ECA

Administrator can perform variety of tasks from the ECA in order to install security products and control client devices. Follow links below to read more about those topics.

Managing the Endpoint security product from ECA

All Endpoint security products can be managed from ECA. Policies are used to apply settings to single computers or groups. For example, you can create a policy to block access to certain web localities or change all other settings from in the product. Policies can be merged, as shown in our example. Policies set using ECA cannot be overwritten by a user on a client machine. However, the administrator can use the override feature to allow a user to make changes on a client temporarily. When you are finished making changes, you can request the final configuration from the client and save it as a new policy.

Tasks can also be used to manage clients. Tasks are deployed from the ECA and executed on the client by the ESET Management Agent. The most common tasks for Windows Endpoints are:

Update modules (also updates the virus database)

Run On-Demand scan

Run custom command

Request the computer and product configuration

Reporting the computer status and getting information from clients to ECA

Each client computer is connected to ECA through ESET Management Agent. The Agent reports all requested information about the client machine and its software to the ECA. All logs from Endpoints or other ESET security products are sent to the ECA.

Information about installed ESET products and other basic information about a client's OS and status can be found in Computers. Select a client and click Show Details. In the gear_icon Configuration section of this window, a user can look up older configurations or request current configuration. In the Logs section, a user can request logs (from Windows computers only).

ECA also allows you to access a list of all alerts (device alerts and threats) from client devices. Alerts from a single device can be viewed in Computers. Select a client and click Show Details > Threats and Quarantine.

You can generate custom reports on-demand or using a scheduled task to view data about clients in your network. Pre-defined report templates offer a quick way to gather important data, or you can create your own new templates. Examples of reports include aggregated information about computers, threats, quarantine and necessary updates.