What's new
In addition to the new ESET Inspect version 1.7, the ESET Inspect is now available in a cloud form, a brand new ESET Inspect Cloud.
The version 1.7 brings you new features and improvements:
ESET Inspect is a new name of the product formerly known as ESET Enterprise Inspector. This name has been chosen for multiple reasons but most importantly to be aligned with our central management solution, and its ecosystem, ESET PROTECT and also to remove the term Enterprise from the name as EDR/XDR tools have become an important part of all types of business security product stacks and not limited to only enterprise grade customers. •ESET Inspect is the new name of the product formerly known as ESET Enterprise Inspector. •ESET Inspect Cloud is the product in a cloud form. •ESET Inspect Connector is the new name for ESET Enterprise Agent (EEI Agent) used in previous versions. The standalone name of the product is ESET Inspect and ESET Inspect Cloud, but within the upper bar of the Web Console you will see ESET PROTECT & INSPECT and ESET PROTECT & INSPECT Cloud. This is to reinforce the single pane of glass concept and the interconnection between our central security management console ESET PROTECT and the detection & response console Inspect. The two are linked together in various points and thanks to the single-sign-on mechanism there are no boundaries for their users. In version 1.7, unification and consistency improvements of the UI between the two flagship consoles took place, and will continue with future releases. |
ESET Inspect now supports major Linux distributions. This completes the multi-platform OS coverage. ESET Inspect Connector cooperates closely with the ESET Endpoint for Linux 9.0 (and newer) which is the primary prerequisite. See supported Linux distributions. |
Response / Remediation actions
You can respond to detection and perform a remediation action directly from the Detection details view. Click the Remediation button and select rule actions. You can choose to protect a network or a computer. Protect a network •Block executable •Clean & block executable •Isolated from Network Protect computer •Kill process on this computer •Scan computer for malware •Shutdown computer You can combine multiple actions if required. Click Apply rule actions to create the detection rule. Additionally, a new Active Rule Actions column was added in the Rules view and Remediation actions in the Rules detail. A newly added group of rules for automatic remediation actions has enriched the default ruleset. When triggered, the remediation actions rules will stop highly suspicious processes. You can identify these rules in More > Rules by the Active rule actions column. We recommend that you get familiar with remediation actions rules and observe their behavior in your environment. If you encounter unfavorable results, you can disable the rules to deactivate automatic remediation action. You can turn off each rule (created by automatic remediation actions) separately. ESET Inspect contains rules that can actively kill processes on users' computers, which may impact user experience. |
Improved Automatic Exclusions (Questions view)
The Automatic Exclusions pop-up window in Questions view was improved. It provides links (View exclusion, View rule, View detection) that open in a new browser tab to make viewing details of suggested exclusions easier. |
A mighty tool providing terminal access to Microsoft Windows systems (Powershell version 5.1 or newer). The terminal is especially useful as a live response tool. Only available to the ESET Inspect users with 2FA (two-factor authentication) enabled to minimize security risk. |
Unification and consistency between the Web Consoles of ESET PROTECT and ESET Inspect
•ESET PROTECT ecosystem / ESET Business ecosystem - A quick access to the ESET PROTECT Web Console, ESET Business Account, and other useful links. •Admin section transformed into More section with quick links. •New action buttons for Computers, Detections, Executables and other screens. •Added preview panel in Detections and Computers. •Added navigation to the corresponding view in ESET PROTECT from Detections and Computers. •Computers view contains Alerts column showing interactive bubbles with alerts count - click the bubble to go the Alerts view in Computer details. |
Tooltips for Trigger Event column
Text bubbles added for the Trigger Event column in the Detections table are shortened. When the text string is shortened, hover above for a text bubble with a full-text string to show up. |
ESET MDR tag is applied to Incidents handled by ESET Services Representatives. You can use the tag to filter in various views. |
The description of an Incident was previously hard to access and not immediately visible in the Incident detail view. This has been improved and the description is part of the default view when an Incident is opened. |
Database cleaning mechanism that you can manually initiate to address some issues (for example a low disk space on the MySQL or MS SQL server). This option is available only in the on-premises version of ESET Inspect in the Settings section for easy access. |