Overview
Key Features
What's new
Types of protection
Manage ESET Server Security remotely
ESET Vulnerability & Patch Management
System requirements
Install / Upgrade
Prepare for installation
ESET Server Security installation steps
Export settings or remove installation
Initial modules update
Silent / Unattended installation
Command line installation
Upgrade to the latest version
Upgrade via ESET Cluster
Upgrade via ESET PROTECT
Installation in cluster environment
Terminal Server
Security and stability updates
Activate ESET Server Security
Activation successful
ESET PROTECT Hub account
Activation failure
License
Using ESET Server Security
Monitoring
Windows update available
Network Isolation
Log files
Log filtering
Scan
Scan window and scan log
Update
Setup
Server
Cluster
Cluster wizard - Select nodes
Cluster wizard - Cluster settings
Cluster wizard - Cluster setup settings
Cluster wizard - Nodes check
Cluster wizard - Nodes install
Computer
Network
Network connections
Configure network protection
Resolve blocked communication
Web and email
Tools - Diagnostic logging
Import and export settings
Tools
Running processes
Protection statistics
ESET Shell
Usage
Commands
Keyboard shortcuts
Batch files / Scripting
ESET SysInspector
Scheduler
Scheduler - Add task
Task type
Task execution
Event triggered
Run application
Skipped task
Scheduled task overview
Submit samples for analysis
Suspicious file
Suspicious site
False positive file
False positive site
Other
Quarantine
Help and support
Submit system configuration data
Technical support
About ESET Server Security
OneDrive scan setup
Register ESET OneDrive scanner
Unregister ESET OneDrive scanner
Advanced setup
Protections
Detection responses
SSL/TLS
Application scan rules
Certificate rules
Encrypted network traffic
Time slots
Real-time file system protection
Processes exclusions
ThreatSense parameters
File extenstions excluded from scanning
Additional ThreatSense parameters
An infiltration is detected
HIPS
HIPS rule settings
HIPS advanced settings
Cloud-based protection
Exclusion filter
Network access protection
Network connection profile
Add or edit network connection profile
Activators
IP sets
Firewall
Firewall rules
Learning mode settings
End learning mode
Application modification detection
Network attack protection
IDS rules
Suspected threat blocked
Temporary IP address blacklist
Brute-force attack protection
Brute-force attack protection rules
Brute-force attack protection exclusions
Email client protection
Mail transport protection
Mailbox protection
Integrations
Microsoft Outlook toolbar
Outlook Express and Windows Mail toolbar
Confirmation dialog
Response
Rescan messages
Web access protection
URL list management
Create new list
HTTP(S) traffic scanning
Web control
Anti-Phishing web protection
Browser protection
Device control
Device rules
Device groups
Document protection
Scans
ESET management console server scan targets
Exclusions
Performance exclusions
Detection exlusions
Create exclusion wizard
Automatic exclusions
Advanced options
Network traffic scanner
Web and email clients
Device scan
Profile manager
Profile targets
Scan targets
Command line scanner
Idle-state scan
Startup scan
Automatic startup file check
Removable media
Hyper-V scan
OneDrive scan
Updates
Update rollback
Scheduled Task - Update
Update mirror
Connectivity
Proxy server
License
Cluster
Troubleshooting
Diagnostics
Log files
Technical support
Remote management
ESET RMM
WMI Provider
Provided data
Accessing Provided Data
User interface
Access setup
ESET CMD
ESET Shell
Disable GUI on Terminal Server
Icon in the Windows notification area
Notifications
Application statuses
Disabled messages and statuses
Desktop notifications
Customization
Desktop notifications
Forward to email
Interactive alerts
Restart required
Microsoft Windows update
Presentation mode
Applications excluded from Presentation mode
Revert to default settings
ESET Glossary
Legal documents
End User License Agreement
Privacy Policy
Last updated: Febuary 18, 2025