ESET Online Help

Search English
Select the topic

Introduction to ESET PROTECT

ESET PROTECT allows you to manage ESET products on workstations, servers and mobile devices in a networked environment from one central location.

Using the ESET PROTECT Web Console, you can deploy ESET solutions, manage tasks, enforce security policies, monitor system status and quickly respond to problems or threats on remote computers. See ESET PROTECT architecture and infrastructure elements overview, Getting started with ESET PROTECT Web Console and Supported Desktop Provisioning Environments.

ESET PROTECT is made up of the following components:

  • ESET PROTECT Server—Handles communication with Agents, and collects and stores application data in the database. ESET PROTECT Server can be installed on Windows and Linux servers, and also comes as a Virtual Appliance.
  • ESET PROTECT Web Console—Is the primary interface that enables you to manage client computers in your environment. It displays a status overview of clients on your network and lets you to deploy ESET solutions to unmanaged computers remotely. After you install ESET PROTECT Server, you can access the Web Console using your web browser. If you choose to make the web server available via the internet, you can use ESET PROTECT from any place or device with an internet connection.
  • ESET Management Agent—Facilitates communication between the ESET PROTECT Server and client computers. The Agent must be installed on a client computer to establish communication between that computer and the ESET PROTECT Server. Because it is located on a client computer and can store multiple security scenarios, the ESET Management Agent significantly lowers reaction time to new detections. Using ESET PROTECT Web Console, you can deploy the ESET Management Agent to unmanaged computers identified by Active Directory or ESET RD Sensor. If necessary, you can also manually install the ESET Management Agent on client computers.
  • ESET Rogue Detection Sensor—Detects unmanaged computers on your network and sends their information to the ESET PROTECT Server. This enables you to manage new client computers in ESET PROTECT without needing to manually search and add them. The Rogue Detection Sensor remembers computers that have been discovered and will not send the same information twice.
  • ESET Bridge—Is a service that can be used in combination with ESET PROTECT to:
    • Distribute updates to client computers and installation packages to the ESET Management Agent.
    • Forward communication from ESET Management Agents to the ESET PROTECT Server.
  • Mobile Device Connector—Is a component for Mobile Device Management with ESET PROTECT, permitting you to manage mobile devices (Android and iOS) and administer ESET Endpoint Security for Android.
  • ESET PROTECT Virtual Appliance—Is intended for users who want to run ESET PROTECT in a virtualized environment.
  • ESET PROTECT Virtual Agent Host—Is a component of ESET PROTECT that virtualizes agent entities to manage agent-less virtual machines. This solution enables automation, dynamic group utilization and the same level of task management as ESET Management Agent on physical computers. The Virtual Agent collects information from virtual machines and sends it to the ESET PROTECT Server.
  • Mirror Tool—Is necessary for offline module updates. If your client computers do not have an internet connection, you can use the Mirror Tool to download update files from ESET update servers and store them locally.
  • ESET Remote Deployment Tool—Deploys all-in-one packages created in the <%PRODUCT%> Web Console. It is a convenient way to distribute ESET Management Agent with an ESET product on computers over a network.
  • ESET Business Account—Is a license management portal for ESET business products. See ESET PROTECT License Management for instructions to activate your product, or see the ESET Business Account Online Help for more information about using the ESET Business Account. If you already have an ESET-issued Username and Password that you want to convert to a license key, see Convert legacy license credentials.
  • ESET Inspect—Is a comprehensive Endpoint Detection and Response system that includes features, such as incident detection, incident management and response, data collection, indicators of compromise detection, anomaly detection, behavior detection and policy violations.

note

For more information, see the ESET PROTECT Online user guide.