Documentation for endpoints managed remotely
ESET business products as well as ESET Endpoint Security can be managed remotely on client workstations, servers and mobile devices in a networked environment from one central location. System administrators who manage more than 10 client workstations may consider deploying one of the ESET remote management tools to deploy ESET solutions, manage tasks, enforce security policies, monitor system status and quickly respond to problems or threats on remote computers from one central location.
ESET remote management tools
ESET Endpoint Security can be managed remotely by either ESET PROTECT On-Prem or ESET PROTECT.
- ESET PROTECT HUB—Central gateway to the ESET PROTECT On-Prem unified security platform. It provides centralized identity, subscription and user management for all ESET platform modules. See ESET PROTECT On-Prem License Management for instructions to activate your product. ESET PROTECT HUB will replace ESET Business Account and ESET MSP Administrator completely.
- ESET Business Account—License management portal for ESET business products. See ESET PROTECT On-Prem License Management for instructions to activate your product, or see the ESET Business Account Online Help for more information about using ESET Business Account. If you already have an ESET-issued Username and Password that you want to convert to a license key, see Convert legacy license credentials.
Additional security products
- ESET Inspect—Is a comprehensive Endpoint Detection and Response system that includes features, such as incident detection, incident management and response, data collection, indicators of compromise detection, anomaly detection, behavior detection and policy violations.
- ESET Endpoint Encryption—Is a comprehensive security application designed to protect your data at rest and in transit. Using ESET Endpoint Encryption, you can encrypt files, folders and emails or create encrypted virtual disks, compress archives and include a desktop shredder for secure file deletion.
Third-party remote management tools
Best practices
- Connect all endpoints with ESET Endpoint Security to ESET PROTECT On-Prem.
- Protect the Advanced setup settings on connected client computers to avoid unauthorized modifications.
- Apply a recommended policy to enforce available security features.
- Minimize the user interface to reduce or limit user interaction with ESET Endpoint Security.