Computer details
There are the following tiles with details about the computer:
•Computer—Name of the computer.
•Select Tags—Assign tag(s) to a computer from the list of existing, or create a new custom tag(s).
•FQDN—Fully qualified domain name if your server is a member of a domain.
•Parent Group—The name of a group of computers where this specific computer is assigned. The computer’s group can be changed in the ESET PROTECT.
•Last connected—Permanent connection created to listen on notification about blocked hashes, requests to download some file, kill the process, etc. The refresh interval is 90 seconds.
•Last event—The timestamp of the last event is sent to the server. This event occurred on the computer, not when it was sent to the ESET Inspect Server.
•ESET Inspect Connector version—Version of the ESET Inspect Connector, deployed on the specific computer.
•OS Name—The operating system's name running on the specific computer.
•OS Version—The name of the OS running on this specific computer
Unresolved Detections (Unique / Total):
Threats |
Detection(s) with threat severity present on this computer. |
---|---|
Warnings |
Detection(s) with warning severity present on this computer. |
Informational |
Detection(s) with informational severity present on this computer. |
•Group—The name of a group of computers where this specific computer is assigned. The computer’s group can be changed in the ESET PROTECT.
•Isolated From Network—The information whether the computer was isolated from the network.
•Received Events From Today—Count of events that appear today.
•Stored Events From Today—Count of events stored today in the database. The difference against the received events from today is caused by Event Filters.
•Endpoint Version—The version of installed ESET Endpoint Security on this specific computer.
•OS Platform—The bit version of OS running on this specific computer.
•Network Adapters—Shows information about all network adapters.
•Sysinspector Logs—Shows the list of Sysinspector logs requested for this computer.
•Comments—Add an optional comment to recognize the detection easily.
Action buttons:
Details (Protect) |
Go to the ESET PROTECT Web Console. |
---|---|
Detections |
Go to the Detections tab. |
Executables |
Go to the Executables tab. |
Scripts |
Go to the Scripts tab. |
Events |
Go to the Events tab. |
Scan |
Sends the command to Endpoint to start an immediate scan of the computer (or use the Action button). |
Network Isolation |
Isolate the computer from the network (only connections between ESET Security products are available). If required, you can also End isolation (available only for Windows endpoints; File Security from 7.2.12003.0). |
Connect via Terminal |
Go to the Terminal tab. |
Power |
Sends the command to reboot or shut down the computer. |
Log out |
Logs the currently logged user out. |
Send wake-up call |
Sends the Wake-Up command to force the computer to send all events since the last connection (or use Action button). |
Generate SysInspector log |
Generate the SysInspector log and review it in the computer's details (or use the Action button). |
Tags |
Assign tag(s) to a computer from the list of existing, or create a new custom tag(s). |
Audit log |
Go to the Audit log tab. |
Filter |
Quick filters, depending on the column where you activated the context menu (Show only this, Hide this). |
Incident |
Create an incident report, add to currently active, or add to (last 3 incidents). |