Key configuration entries

In this section, we explain several of the key configuration entries for Windows product line v3 and v4:

Windows product line v3 and v4 > ESET Kernel > Settings > Remote administration
Here you can enable communication between client computers and the ERAS (Connect to Remote Administrator server). Enter the name or IP address of ERAS (Primary/secondary server address). The Interval between connections to server option should be left at the default value of five minutes. For testing purposes, this value can be decreased to 0, which will establish a connection every ten seconds. If a password is set, use the one which was specified in ERAS. For more information, see the Password for Clients option in the Security tab chapter. Additional information on password configuration can also be found in this section.

ESET Kernel > Settings > License keys
Client computers require no license keys to be added or managed. License keys are only used for server products.

ESET Kernel > Settings > ESET Live Grid
This branch defines the behavior of the ESET Live Grid Early Warning System, which allows submission of suspicious files for analysis to ESET’s labs. When deploying ESET solutions to a large network, the Submit suspicious files and Enable submission of anonymous statistical information options are particularly important: If these are set to Do not submit or No, respectively, the ESET Live Grid System is completely disabled. To submit files automatically without user interaction, select Submit without asking and Yes, respectively. If a proxy server is used with the Internet connection, specify the connection parameters under ESET Kernel > Setup > Proxy server.
By default, the client products submit suspicious files to ERAS, which submits them to ESET’s servers. Therefore, the proxy server should be correctly configured in ERAS (Tools > Server Options > Advanced > Edit Advanced Settings > ERA Server > Setup > Proxy server).

ESET Kernel > Settings > Protect setup parameters
Allows the administrator to password-protect the setup parameters. If a password is established, it will be required in order to access the setup parameters on client workstations. However, the password will not affect any changes to the configuration made from ERAC.

ESET Kernel > Settings > Scheduler / Planner
This key contains the Scheduler/Planner options, which allow the administrator to schedule regular antivirus scans, etc.

NOTE: By default, all ESET security solutions contain several predefined tasks (including regular automatic update and automatic check of important files on startup). In most cases, it should not be necessary to edit or add new tasks.

ESET Kernel > Settings > Default user interface values
The settings under Default user interface values (i.e., Show splash screen/Don’t show splash screen) only apply modifications to the client’s default settings. The client’s settings can then be managed on a per-user basis and cannot be changed remotely. To change the setting remotely the Suppress user settings option must be set to Yes. The Suppress user settings option is only available for clients running 4.0 or later ESET security products.

This branch of the Configuration Editor allows you to define how update profiles are applied. Normally, it is only necessary to modify the predefined profile My profile and change the Update server, Username and Password settings. If Update server is set to Choose Automatically, all updates will be downloaded from ESET’s update servers. In this case, please specify the Username and Password parameters which were provided at the time of purchase. For information on setting client workstations to receive updates from a local server (Mirror), please see the chapter titled Mirror server. For more information on using the scheduler, see chapter Scheduler.

NOTE: On portable devices such as notebooks, two profiles can be configured; one to provide updating from the Mirror server and the other to download updates directly from ESET’s servers. For more information, see the Combined update for notebooks chapter at the end of this document.