Computer details
The following tiles show details about a specific computer:
•Computer—The computer's name.
•Select Tags—Assign existing tags to a computer or create custom tags.
•FQDN—If applicable, your server's fully qualified domain name.
•Parent Group—A computer group's name where a specific computer is assigned. You can change the computer's group in ESET PROTECT.
•Last connected—The permanent connection, which refreshes every 90 seconds, created for listening to blocked hash notifications, requests to download a file or kill a process.
•Last event—The last event’s timestamp that was sent to the server. This event occurred on the computer, not when it was sent to the ESET Inspect Server.
•ESET Inspect Connector version—The ESET Inspect Connector version, deployed on the computer.
•OS Name—The operating system (OS) running on the computer.
•OS Version—The OS version running on the computer.
Unresolved Detections
Threats |
Threat severity detections are present. |
---|---|
Warnings |
Warning severity detections are present. |
Informational |
Informational severity detections are present. |
•Group—A computer group's name where a specific computer is assigned. You can change the computer's group in ESET PROTECT.
•Isolated From Network—Shows if the computer is isolated from the network.
•Received Events From Today—The count of events that appear today.
•Stored Events From Today—The count of events stored in the database today.
•Endpoint Version—The ESET Endpoint Security version installed on this computer.
•OS Platform—The OS bit version running on this computer.
•Network Adapters—Show information about all network adapters.
•Sysinspector Logs—Show the list of Sysinspector logs requested for this computer.
•Comments—Add a comment.
Action buttons:
Details (Protect) |
Go to the ESET PROTECT Web Console. |
---|---|
Detections |
Go to the Executable detections tab. |
Executables |
Go to the Executables tab. |
Scripts |
Go to the Scripts tab. |
Events |
Go to the Events tab. |
Scan |
Send the command to an Endpoint, starting an immediate computer scan (or use the Action button). |
Network Isolation |
Isolate the computer from the network (only connections between ESET Security products are available). You can also End isolation (available only for Windows endpoints; File Security from 7.2.12003.0). |
Connect via Terminal |
Go to the Terminal tab. |
Power |
Send a command to restart or shut down the computer. |
Log out |
Log the current user out. |
Send wake-up call |
Send the Wake-Up command, forcing the computer to send all events since the last connection (or use the Action button). |
Generate SysInspector log |
Generate the SysInspector log, which you can review in the computer's details. |
Tags |
Assign tags from the existing list or create new custom tags. |
Audit log |
Go to the Audit log tab. |
Incident |
oCreate an incident report oAdd to a current incident oAdd to recent incident, which shows the last three incidents oSelect incident to add to |