Key Features
The following table explains the features available in the ESET Server Security. In larger networks, you can use ESET PROTECT to remotely manage ESET Server Security.
True 64-bit product core |
Adds higher performance and stability to the product core components. |
---|---|
An award-winning and innovative defense against malware. This leading-edge technology prevents attacks and eliminates all types of threats, including viruses, ransomware, rootkits, worms and spyware with cloud-powered scanning for even better detection rates. With a small footprint, it is light on system resources while not compromising performance. It uses layered security model—each layer, or phase, has a number of core technologies. The pre-execution phase has technologies such as UEFI Scanner, Network Attack Protection, Reputation & Cache, In-product Sandbox and DNA Detections. The execution phase technologies include Exploit Blocker, Ransomware Shield, Advanced Memory Scanner and Script Scanner (AMSI). The post-execution phase uses Botnet Protection, Cloud Malware Protection System and Sandboxing. This feature-rich set of core technologies provides unrivaled protection. |
|
A new feature added to scan files placed in OneDrive cloud storage for Office 365 business account. |
|
A new technology that allows scanning Virtual Machine (VM) disks on Microsoft Hyper-V Server without the need of any "Agent" on the specific VM. |
|
An ESET Cloud-based service. When ESET Server Security detects suspicious code or behavior, it prevents further threat activity by temporarily putting the suspicious file into ESET LiveGuard Advanced quarantine. A suspicious sample is automatically submitted to ESET LiveGuard Advanced server for analysis by advanced malware detection engines. Your ESET Server Security then receives analysis results. The suspicious file is dealt with depending on the result. |
|
Allows multiple server management from a single location. Joining workstations to nodes will offer additional automation of management because you can distribute one configuration policy across all cluster members. The creation of clusters is possible using the node installed, which can then install and initiates all nodes remotely. ESET server products are able to communicate with each other and exchange data, such as configuration and notifications, as well as synchronize data necessary for proper operation of product instance groups. This allows for the same product configuration for all cluster members. Windows Failover Clusters and Network Load Balancing (NLB) Clusters are supported by ESET Server Security. Additionally, you can add ESET Cluster members manually without the need for a specific Windows Cluster. ESET Clusters work in domain and workgroup environments. |
|
Automatic detection and exclusion of critical applications and server files for smooth operation and performance. |
|
Excludes specific processes from Anti-Malware on-access scanning. Anti-Malware on-access scanning may cause conflicts in certain situations, for example during a backup process or live migrations of virtual machines. Processes exclusions help minimize the risk of such potential conflicts and improve the performance of excluded applications, having a positive effect on the overall performance and system stability. The exclusion of a process/application is an exclusion of its executable file (.exe). |
|
eShell (ESET Shell) |
A command line interface that offers advanced users and administrators more comprehensive options to manage ESET server products. |
Offers better integration with ESET PROTECT, including scheduling an On-demand scan. For more information, see ESET PROTECT Online Help. |
|
Customizes installation to contain only selected product parts. |