Settings
Configure your ESET Inspect On-Prem environment. ESET Inspect Database settings are available only in the on-premises version.
Use these options to clean logs regularly, preventing a database overload. The database cleanup process runs daily at midnight. A warning displays in the Notifications view, and a failed purge shows in the Events load view if there is a process problem. Store low-level data for—Choose the interval for database clean-up (events and processes records), or click Invoke purge for immediate clean-up. Store detections for—Choose the interval for database clean-up (detections and executables records), or click Invoke purge for immediate clean-up. |
Provides the same options as the ESET Inspect Server installation process on the Data Collection window. Use pre-defined options or the Advanced button to choose the stored data. |
Number of threads writing to database—Set the number of cores to increase the performance using this formula: 1.5x the number of physical cores on your server running the ESET Inspect Database. |
Add your preferred search engine for executable hashes. |
Use these options to select which new rules you want to enable after the rules update: •Enable detection rules with Threat, Warning, and Information severity—ideal for advanced users who want complete visibility and are already familiar with ESET Inspect On-Prem, which prefer to customize everything manually. •Enable detection rules with Threat and Warning severity—ideal for skilled users who want to do Threat Hunting and evaluate malicious and potentially malicious events. •Enable only detection rules with Threat severity—ideal for new users who know cyber attacks but want to evaluate only confirmed threats. •Disable all detection rules—ideal for new users with no experience with EDR solutions and start with an analysis of confirmed malware and attacks detected and blocked by the ESET Endpoint product. To disable automatic remediation actions uncheck the Automatically execute remediation actions specified by rules. |
Click Enable to access the notification window. |
ESET Inspect Web Console certificate
Change the ESET Inspect Web Console certificate to communicate with the ESET Inspect Server. |
Select the communication certificate used between ESET Inspect Connector and ESET Inspect Server. |
To use an HTTP proxy, specify server settings. |
Set the ESET Inspect instance name that displays in a web browser tab. You can use emoji for the instance name. |
Enable if you want to provide the ESET Inspect Web Console remote access to the ESET Support team.
|
Choose your preferred Trace log verbosity to determine how much information is collected and logged. Alternatively, use the ESET PROTECT On-Prem policy. |
Select the check box if you want to automatically send crash reports and Telemetry data to ESET. |
User settings
To access the user settings, click your username next to Log out.
Choose your preferred color theme. Default (light) theme Dark theme System color theme—Based on system preferences, either Default (light) theme or Dark theme. |