Details

In the first tile, you can find the following details:

Computer—shows the name of the computer

Select tags—if a tag is already assigned to the computer, the name of the tag is shown above

FQDN—means, fully qualified domain name,  is a domain name that specifies its exact location in the tree hierarchy of the Domain Name System (DNS)

Parent Group—the name of a group of computers where this particular computer is assigned. The computer’s group can be changed in the ESET PROTECT

Last connected—permanent connection created to listen on notification about blocked hashes, requests to download some file, kill the process, etc. The refresh interval is ninety seconds

Last event—is the timestamp of the last event sent to the server. So the time when this event occurred on the computer, not when it was sent to the EEI Server

Agent version—version of the EEI Agent, deployed on the particular computer

OS Name—the name of the operating system that is running on the particular computer

OS Version—the version number of the operating system that is running on the particular computer

 

In the second tile, you can find the following details:

Threats—unique/total—total count of unresolved threat detections. After clicking it, you are redirected to the Detections tab with Threat severity chosen as a filter

Warnings—unique/total—total count of unresolved warning detections. After clicking it, you are redirected to the Detections tab with Warning severity chosen as a filter

Informational—unique/total—total count of unresolved informational detections. After clicking it, you are redirected to the Detections tab with Informational severity chosen as a filter

 

Under the tiles, this information can be found:

Group—the name of the group of computers where this particular computer is assigned

Isolated From Network—the information whether the computer was isolated from the network. You can isolate/end isolation from network by the button at the bottom of the screen

Last connected—permanent connection created to listen on notification about blocked hashes, requests to download some file, kill the process, etc. Refresh interval is 90 seconds

Last event—is the timestamp of the last event sent to the server. So the time when this event occurred on the computer, not when it was sent to EIServer

Received Events From Today—count of events that appear today

Stored Events From Today—count of events stored today in the database. The difference against the received events from today is caused by Event Filters.

Agent Version—version of EEI Agent deployed on the particular computer

Endpoint Version—the version of installed ESET Endpoint Security on this particular computer

OS Platform—the bit version of OS running on this particular computer

OS Version—the name of the OS running on this particular computer

Network Adapters—information about all network adapters present on the computer

Sysinspector Logs—shows the list of sysinspector logs requested for this computer by using the Sysinspector Log button at the bottom of the window

Comments—the place where the user can put his comments for this computer. You can add the comment by clicking the Add comment blue string

 

Available buttons to use on the Details tab:

ESET PROTECT—on the upper right side, it navigates you to the ESET PROTECT Server Web Interface

INCIDENT—used to create an incident report, add to the currently active incident, add to one of the three latest active incidents

REBOOT—sends the command to reboot the computer

SHUTDOWN—sends the command to shut down the computer

SEND WAKE-UP CALL—send the Wake-Up command that will force the computer to send all events since the last connection

SCAN—sends the command to Endpoint to start an immediate scan of the computer

GENERATE SYSINSPECTOR LOG—used to request the computer to create the sysinspector log file. This may take a while, and after creating the log file, it is visible in the sysinspector log file row in the form date and time of creation

ISOLATE FROM NETWORK—used to isolate the particular computer from the network

note

Note

To use these buttons, user need to have the right permission-set set in the ESET PROTECT.